Refine your search

Your search returned 109 results.

Sort
Results
21.
Digital business security development : management technologies by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey, PA : Business Science Reference, c2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 KER-D.

22.
Network security : private communication in a public world by Series: Prentice Hall series in computer networking and distributed systems
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : PHI, c2002
Availability: Items available for loan: IIITD (3)Call number: 005.8 KAU-N, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KAU-N. Not available: IIITD: Checked out (1).

23.
Fault analysis in cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer, 2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 JOY-F.

24.
A multidisciplinary introduction to information security by Series: Discrete mathematics and its applications
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 MJO-M.

25.
Introduction to security and network forensics by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : CRC Press, ©2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 BUC-I.

26.
Digital watermarking and steganography : fundamentals and techniques by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, Fl : Taylor & Francis, c2008
Availability: Items available for loan: IIITD (1)Call number: 005.8 SHI-D.

27.
Modern cryptography, probabilistic proofs, and pseudorandomness by Series: Algorithms and combinatorics ; 17
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, c1999
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 GOL-M.

28.
The unofficial guide to ethical hacking by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi: Macmillan India, ©2001
Availability: Items available for loan: IIITD (1)Call number: 005.8 FAD-E.

29.
Computer forensics and cyber crime : an introduction by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson, ©2009
Online access:
Availability: Items available for loan: IIITD (1)Call number: 005.8 BRI-C.

30.
Computer security fundamentals by Series: Security series (Upper Saddle River, N.J.)
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson, ©2006
Availability: Items available for loan: IIITD (1)Call number: 005.8 EAS-C.

31.
Computer security : principles and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, ©2010
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 STA-C.

32.
Network security essentials : applications and standards by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson, ©2011
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-N.

33.
Security in computing by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson, ©2009
Online access:
Availability: Items available for loan: IIITD (1)Call number: 005.8 PFL-S.

34.
Information security : principles and practices by Series: Security series (Upper Saddle River, N.J.)
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi: Pearson, ©2006
Online access:
Availability: Items available for loan: IIITD (1)Call number: 005.8 MER-I.

35.
Automatic malware analysis : an emulator based approach by Series: SpringerBriefs in computer science
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, NY : Springer, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.84 YIN-A.

36.
SQL injection attacks and defense by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham, MA : Elsevier, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CLA-S.

37.
The CERT Oracle secure coding standard for Java by Series: SEI series in software engineering
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 LON-C.

38.
The CERT C secure coding standard by Series: The SEI series in software engineering
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2009
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 SEA-C.

39.
Secure coding in C and C++ by Series: SEI series in software engineering
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2013
Other title:
  • Secure coding in C and C plus plus
Availability: Items available for loan: IIITD (5)Call number: 005.8 SEA-S, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SEA-S.
  (1 votes)
40.
Computer and information security handbook by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York.; Elsevier, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 VAC-C.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in