Refine your search

Your search returned 2117 results.

Sort
Results
41.
Computational number theory and modern cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 YAN-C.

42.
Mobile phone security and forensics a practical approach by Series: SpringerBriefs in electrical and computer engineering
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: New York : Springer, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 621.384 AND-M.

43.
Android forensics : investigation, analysis, and mobile security for Google Android by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham : Syngress, c2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.4 HOO-A.

44.
Digital watermarking and steganography : fundamentals and techniques by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, Fl : Taylor & Francis, c2008
Availability: Items available for loan: IIITD (1)Call number: 005.8 SHI-D.

45.
Wireless networks : multiuser detection in cross-layer design by Series: Information technology--transmission, processing, and storage
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Springer, ©2005
Availability: Items available for loan: IIITD (4)Call number: 621.382 DET-W, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 621.382 DET-W.

46.
Modern cryptography, probabilistic proofs, and pseudorandomness by Series: Algorithms and combinatorics ; 17
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, c1999
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 GOL-M.

47.
Building secure servers with Linux by
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Beijing ; Sebastopol, CA : O'Reilly, [2002], c2003
Other title:
  • Linux
Availability: Items available for loan: IIITD (1)Call number: 005.8 BAU-B.

48.
Linux server security by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Beijing ; Sebastopol, CA : O'Reilly, ©2005
Availability: Items available for loan: IIITD (1)Call number: 005.8 BAU-L.

49.
Kerberos : the definitive guide by
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Beijing ; Farnham : O'Reilly, ©2003
Availability: Items available for loan: IIITD (1)Call number: 005.8 GAR-K.

50.
Apache cookbook by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Sebastopol, CA : O'Reilly, c2008
Availability: Items available for loan: IIITD (1)Call number: 005.8 COA-A.

51.
The unofficial guide to ethical hacking by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi: Macmillan India, ©2001
Availability: Items available for loan: IIITD (1)Call number: 005.8 FAD-E.

52.
Computer forensics and cyber crime : an introduction by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson, ©2009
Online access:
Availability: Items available for loan: IIITD (1)Call number: 005.8 BRI-C.

53.
Computer security fundamentals by Series: Security series (Upper Saddle River, N.J.)
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson, ©2006
Availability: Items available for loan: IIITD (1)Call number: 005.8 EAS-C.

54.
Computer security : principles and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, ©2010
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 STA-C.

55.
Network security essentials : applications and standards by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson, ©2011
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-N.

56.
Security in computing by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson, ©2009
Online access:
Availability: Items available for loan: IIITD (1)Call number: 005.8 PFL-S.

57.
Information security : principles and practices by Series: Security series (Upper Saddle River, N.J.)
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi: Pearson, ©2006
Online access:
Availability: Items available for loan: IIITD (1)Call number: 005.8 MER-I.

58.
Automatic malware analysis : an emulator based approach by Series: SpringerBriefs in computer science
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, NY : Springer, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 005.84 YIN-A.

59.
SQL injection attacks and defense by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham, MA : Elsevier, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CLA-S.

60.
Algebraic curves in cryptography by Series: Discrete mathematics and its applications
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : CRC, ©2013
Availability: Items available for loan: IIITD (1)Call number: REF 516.352 LIN-A.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in