Refine your search

Your search returned 312 results.

Sort
Results
1.
Scene of cybercrime by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, c2008
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 SHI-S.

2.
Handbook of information security : key concepts, infrastructure, standards, and protocols, vol I by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken : Wiley, ©2006
Availability: Not available: IIITD: Loan on demand (1).

3.
Handbook of information security : information warfare; social, legal, and international issues; and security foundations, vol II by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken : Wiley, ©2006
Availability: Not available: IIITD: Loan on demand (1).

4.
Handbook of information security : threats, vulnerabilities, prevention, detection, and management, vol III by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken : Wiley, ©2006
Availability: Not available: IIITD: Loan on demand (1).

5.
Crimeware : understanding new attacks and defenses by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2008
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 JAK-C.

6.
Microsoft encyclopedia of security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Redmond, Wash. : Microsoft Press, 2003
Availability: Items available for loan: IIITD (1)Call number: REF 005.803 TUL-M.

7.
Network security essentials : applications and standards by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Pearson Education, c2007
Online access:
Availability: Items available for loan: IIITD (1)Call number: 005.8 STA-N.

8.
Cryptography and network security by Series: McGraw-Hill Forouzan networking series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Tata McGraw Hill, ©2008
Availability: Items available for loan: IIITD (2)Call number: 005.82 FOR-F, ...

9.
Internet cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, c2000
Availability: Items available for loan: IIITD (1)Call number: 005.82 SMI-I.

10.
Applied cryptography : protocols, algorithms, and source code in C by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Wiley, ©2001
Availability: Items available for loan: IIITD (5)Call number: 005.82 SCH-A, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.82 SCH-A.
  (1 votes)
11.
Security for telecommunications networks by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Springer, 2008
Availability: Items available for loan: IIITD (2)Call number: 005.8 TRA-S, ...

12.
Modern cryptography : theory and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson, ©2004
Availability: Items available for loan: IIITD (3)Call number: 005.82 MAO-M, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.82 MAO-M. Not available: IIITD: Checked out (1).

13.
Pervasive information security and privacy developments : trends and advancements by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey, PA : Information Science Reference, c2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 NEM-P.

14.
Wireless and mobile network security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : TMH, 2010
Availability: Items available for loan: IIITD (1)Call number: 005.8 VEN-W.

15.
Digital business security development : management technologies by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey, PA : Business Science Reference, c2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 KER-D.

16.
Multimedia forensics and security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey : Information Science Reference, c2009
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 LI-M.

17.
Network security : private communication in a public world by Series: Prentice Hall series in computer networking and distributed systems
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : PHI, c2002
Availability: Items available for loan: IIITD (4)Call number: 005.8 KAU-N, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KAU-N.

18.
Cryptography and network security by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Tata McGraw Hill, ©2010
Availability: Items available for loan: IIITD (2)Call number: 005.8 FOR-C, ... Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 FOR-C.

19.
Embedded java security : security for mobile devices by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London : Springer, ©2007
Availability: Items available for loan: IIITD (1)Call number: 005.8 DEB-E.

20.
A multidisciplinary introduction to information security by Series: Discrete mathematics and its applications
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, c2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 MJO-M.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in