Results
|
21.
|
|
|
22.
|
|
|
23.
|
Fault analysis in cryptography by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York : Springer, 2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 JOY-F.
|
|
24.
|
|
|
25.
|
Introduction to security and network forensics by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boca Raton, FL : CRC Press, ©2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 BUC-I.
|
|
26.
|
|
|
27.
|
|
|
28.
|
The unofficial guide to ethical hacking by
Edition: 2nd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi: Macmillan India, ©2001
Availability: Items available for loan: IIITD (1)Call number: 005.8 FAD-E.
|
|
29.
|
|
|
30.
|
|
|
31.
|
Computer security : principles and practice by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Pearson Education, ©2010
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 STA-C.
|
|
32.
|
|
|
33.
|
Security in computing by
Edition: 4th ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Pearson, ©2009
Availability: Items available for loan: IIITD (1)Call number: 005.8 PFL-S.
|
|
34.
|
|
|
35.
|
|
|
36.
|
SQL injection attacks and defense by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Waltham, MA : Elsevier, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CLA-S.
|
|
37.
|
|
|
38.
|
|
|
39.
|
Secure coding in C and C++ by Series: SEI series in software engineering
Edition: 2nd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2013
Other title: - Secure coding in C and C plus plus
Availability: Items available for loan: IIITD (5)Call number: 005.8 SEA-S, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SEA-S.
|
|
40.
|
Computer and information security handbook by
Edition: Second edition.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York.; Elsevier, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 VAC-C.
|