Refine your search

Your search returned 313 results.

Sort
Results
41.
The art of software security testing : identifying software security flaws by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River: Addison-Wesley, c2007
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 WYS-A.

42.
Network security through data analysis : building situational awareness by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai: Shroff publication ©2014
Availability: Items available for loan: IIITD (1)Call number: 005.8 COL-N.

43.
Computer security handbook, vol I by
Edition: Sixth edition.Vol.I
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey : John Wiley & Sons, ©2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 BOS-C.

44.
Computer security handbook, vol II by
Edition: 6th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey : John Wiley & Sons, ©2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 BOS-C.

45.
Secure messaging on the internet by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston: Artech House, ©2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 OPP-S.

46.
The craft of system security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, © 2008
Online access:
Availability: Items available for loan: IIITD (5)Call number: 005.8 SMI-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SMI-C.
Tags:
  (1 votes)
47.
Bulletproof SSL and TLS : understanding and deploying SSL/TLS and PKI to secure servers and web applications by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London : Feisty Duck, © 2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 RIS-B.

48.
Implementing SSL/TLS using cryptography and PKI by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley, ©2011
Other title:
  • Implementing secure sockets layer/transport layer security using cryptography and public key infrastructure
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 DAV-I.

49.
Practical EJB project for beginners by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai: SPD, 2011
Availability: Items available for loan: IIITD (1)Call number: 005.8 HAR-P.

50.
Windows server 2008 PKI and certificate security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Noida PHI Learning ©2008
Availability: Items available for loan: IIITD (1)Call number: 005.8 KOM-W.

51.
Network security and management by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Haryana : PHI Learning, ©2012
Availability: Items available for loan: IIITD (1)Call number: 005.8 SIN-N.

52.
Cryptography and network security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi PHI Learning ©2015
Availability: Items available for loan: IIITD (1)Call number: 005.8 GUP-C.

53.
Anti hacker toolkit by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : McGraw Hill Education, ©2014
Availability: Items available for loan: IIITD (1)Call number: 005.8 SHE-A.

54.
Comdex : securing IT infrastructure-a complete solution by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Dreamtech, ©2014
Availability: Items available for loan: IIITD (1)Call number: 005.8 AGA-C.

55.
Secure multiparty computation and secret sharing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Oxford University Press, ©2015
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 CRA-S.

56.
Network security and cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Delhi : Cengage Learning, ©2010
Availability: Not available: IIITD: Loan on demand (1).

57.
Instant burp suite starter by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai : Packt Publishing, ©2013
Availability: Items available for loan: IIITD (1)Call number: 658.11 CAR-B.

58.
Burp suite essentials : discover the secrets of web application pentesting using Burp Suite, the best tool for the job by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: UK : Packt Publishing, ©2014
Safari Technical Books (Current File)
Availability: Items available for loan: IIITD (1)Call number: 005.8 MAH-B.

59.
Public-key cryptography : theory and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, ©2009
Availability: Not available: IIITD: Loan on demand (1).

60.
SSL and TLS : designing and building secure systems by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, ©2001
Availability: Items available for loan: IIITD (1)Call number: 005.8 RES-S.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in