Refine your search

Your search returned 2117 results.

Sort
Results
81.
Secure messaging on the internet by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston: Artech House, ©2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 OPP-S.

82.
The craft of system security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, © 2008
Online access:
Availability: Items available for loan: IIITD (5)Call number: 005.8 SMI-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 SMI-C.
Tags:
  (1 votes)
83.
Bulletproof SSL and TLS : understanding and deploying SSL/TLS and PKI to secure servers and web applications by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London : Feisty Duck, © 2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 RIS-B.

84.
Implementing SSL/TLS using cryptography and PKI by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley, ©2011
Other title:
  • Implementing secure sockets layer/transport layer security using cryptography and public key infrastructure
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 DAV-I.

85.
Information systems security : 4th international conference, ICISS 2008, Hyderabad, India, December 16-20, 2008 : proceedings by Series: Lecture notes in computer science ; 5352
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin : Springer, ©2008
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 SEK-I.

86.
Social security for women by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi ; Association of Indian Universities, © 2014
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 368.4 PAN-S.

87.
Artificial intelligence and network security: selected papers of bilingual international conference on information technology: yesterday, today, and tomorrow 19-21 February 2015 by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi ; DESIDOC, ©2015
Availability: Items available for loan: IIITD (1)Call number: 005.8 BHU-A. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 BHU-A.

88.
Cyber security : understanding cyber crimes, computer forensics and legal perspectives by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi ; Wiley, © 2014
Availability: Items available for loan: IIITD (1)Call number: 005.8 GOD-C.

89.
Implementing database security and auditing : a guide for DBA's, information security administrators and auditors by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Elsevier Digital Press, © 2005
Availability: Items available for loan: IIITD (1)Call number: 005.8 NAT-I.

90.
Computer forensics : infoSec pro guide by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: New Delhi : McGraw Hill Education, ©2013
Safari Technical Books (Current File)
Availability: Items available for loan: IIITD (2)Call number: REF 005.8 COW-C, ...

91.
Malware, rootkits & botnets beginner's guide by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: New Delhi : McGraw Hill Education, ©2013
Online access:
Availability: Items available for loan: IIITD (2)Call number: REF 005.8 ELI-M, ...

92.
Database security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Delhi: Cengage Learning, ©2012
Availability: Items available for loan: IIITD (2)Call number: 005.8 BAS-D, ...

93.
Practical EJB project for beginners by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai: SPD, 2011
Availability: Items available for loan: IIITD (1)Call number: 005.8 HAR-P.

94.
Windows server 2008 PKI and certificate security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Noida PHI Learning ©2008
Availability: Items available for loan: IIITD (1)Call number: 005.8 KOM-W.

95.
Network security and management by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Haryana : PHI Learning, ©2012
Availability: Items available for loan: IIITD (1)Call number: 005.8 SIN-N.

96.
Cryptography and network security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi PHI Learning ©2015
Availability: Items available for loan: IIITD (1)Call number: 005.8 GUP-C.

97.
Introduction to modern cryptography by Series: Chapman & hall/crc cryptography and network security series
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, ©2015
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KAT-I.

98.
Anti hacker toolkit by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : McGraw Hill Education, ©2014
Availability: Items available for loan: IIITD (1)Call number: 005.8 SHE-A.

99.
Programming for mobile and remote computers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Dreamtech, ©2011
Availability: Items available for loan: IIITD (1)Call number: 005.133 THA-P.

100.
Comdex : securing IT infrastructure-a complete solution by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Dreamtech, ©2014
Availability: Items available for loan: IIITD (1)Call number: 005.8 AGA-C.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in