Refine your search

Your search returned 109 results.

Sort
Results
41.
Software test attacks to break mobile and embedded devices by Series: Chapman & Hall/CRC innovations in software engineering and software development series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Taylor & Francis, © 2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 HAG-S.

42.
The art of software security testing : identifying software security flaws by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River: Addison-Wesley, c2007
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 WYS-A.

43.
Embedded systems security : practical methods for safe and secure software and systems development by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam : Elsevier, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 KLE-E.

44.
Secure programming with static analysis by Series: Addison-Wesley software security series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2007
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CHE-S.

45.
Digital fortress by
Material type: Text Text; Literary form: Novels
Publication details: London : Corgi Books, ©2004
Availability: Items available for loan: IIITD (1)Call number: F BRO-D. Not available: IIITD: Checked out (1).

46.
Contemporary cryptography by Series: Artech House information security and privacy series
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Artech House, ©2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 OPP-C.

47.
The craft of system security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, © 2008
Online access:
Availability: Items available for loan: IIITD (5)Call number: 005.8 SMI-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SMI-C.
Tags:
  (1 votes)
48.
Information systems security : 4th international conference, ICISS 2008, Hyderabad, India, December 16-20, 2008 : proceedings by Series: Lecture notes in computer science ; 5352
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin : Springer, ©2008
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 SEK-I.

49.
Implementing database security and auditing : a guide for DBA's, information security administrators and auditors by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Elsevier Digital Press, © 2005
Availability: Items available for loan: IIITD (1)Call number: 005.8 NAT-I.

50.
Computer forensics : infoSec pro guide by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: New Delhi : McGraw Hill Education, ©2013
Safari Technical Books (Current File)
Availability: Items available for loan: IIITD (2)Call number: REF 005.8 COW-C, ...

51.
Malware, rootkits & botnets beginner's guide by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: New Delhi : McGraw Hill Education, ©2013
Online access:
Availability: Items available for loan: IIITD (2)Call number: REF 005.8 ELI-M, ...

52.
Windows server 2008 PKI and certificate security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Noida PHI Learning ©2008
Availability: Items available for loan: IIITD (1)Call number: 005.8 KOM-W.

53.
Introduction to modern cryptography by Series: Chapman & hall/crc cryptography and network security series
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, ©2015
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KAT-I.

54.
Programming for mobile and remote computers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Dreamtech, ©2011
Availability: Items available for loan: IIITD (1)Call number: 005.133 THA-P.

55.
Secure multiparty computation and secret sharing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Oxford University Press, ©2015
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CRA-S.

56.
Towards hardware-intrinsic security : foundations and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Heidelberg ; New York : Springer, ©2010
Availability: Not available: IIITD: Loan on demand (1).

57.
Computer security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chichester : Wiley, ©1999
Availability: Items available for loan: IIITD (1)Call number: 005.8 GOL-C.

58.
Art of intrusion : the real stories behind the exploits of hackers, intruders, & deceivers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley, ©2006
Availability: Items available for loan: IIITD (1)Call number: 005.8 MIT-A.

59.
Burp suite essentials : discover the secrets of web application pentesting using Burp Suite, the best tool for the job by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: UK : Packt Publishing, ©2014
Safari Technical Books (Current File)
Availability: Items available for loan: IIITD (1)Call number: 005.8 MAH-B.

60.
Hardware security : design, threats, and safeguards by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, ©2015
Availability: Not available: IIITD: Loan on demand (1).

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in