Your search returned 144 results.

Sort
Results
Fundamentals of computer security Josef Pieprzyk, Thomas Hardjono and Jennifer Seberry by
  • Pieprzyk, Josef
  • Hardjono, Thomas
  • Seberry, Jennifer
Publication details: Berlin Springer verlag 2009
Availability: Items available for loan: University Library (1)Call number: 004.056 PIE.
Encryption Protecting your data Ankit Fadia and Jaya Bhattacharjee by
  • Fadia, Ankit
  • Jaya Bhattacharjee
Publication details: New Delhi Vikas pub 2007
Availability: Items available for loan: University Library (1)Call number: 004.056.55 FAD.
Data mining and machine learning in cyber security Sumeet Dua and Xian Du by
  • Dua, Sumeet
  • Du, Xian
Publication details: Boca ration Auerbach publications 2011
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 DUA.
Data protection governance, risk management and compliance by
  • Hill, David G
Publication details: Boca ration Taylor and Francis 2009
Availability: Items available for loan: University Library (1)Call number: 004.056 HIL.
Current issues and trends in E-Government research by
  • Norris,Donald F
Publication details: Hershey Cyber Tech 2007
Availability: Items available for loan: University Library (1)Call number: 35.077:004.738.5 NOR.
Technocrime: technology, crime and social control ed.by Stephane Leman-Lenglois by
  • Leman-Lenglois, Stephane.,ed [ed.by]
Publication details: Deron Willman 2008
Availability: Items available for loan: University Library (1)Call number: 347.77:007 LEM.
An alternative approach to computer system security monitoring and enhancement through system call sequence analysis(thesis) Surekha Mariam Varghese guided by K Poulose Jacob by
  • Surekha Mariam Varghese
  • Poulose Jacob K, guided by
Publication details: Kochi Department of Computer Science; Cusat 2008
Availability: Items available for reference: University Library : Not For Loan (1)Call number: 681.324:004.056 SUR T.
Intrusion detection a machine learning approach Zhenwei you and Jeffrey J P Tsai by
  • Yu, Zhenwei
Series: Electrical and computer engineering
Publication details: London Imperial College press 2011
Availability: Items available for loan: University Library (1)Call number: 004.72.056.52 YUZ.
Privacy, confidentiality and health research by
  • Lowrance, William W
Series: Cambridge bioethics and law
Publication details: Cambridge Cambridge University Press 2012
Availability: Items available for loan: University Library (1)Call number: 34:608.1 LOW.
Corporate computer and network security by
  • Panko, Raymond R
Edition: 2nd ed
Publication details: Prentice Hall 2010
Availability: Items available for loan: University Library (1).
Network security essentials applications and standards by
  • `Stallings, William
Edition: 4th ed.
Publication details: Chennai Pearson 2013
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 STA.
Cryptography and network security by
  • Gupta, Prakash C
Publication details: Delhi PHI learning private limited 2015
Availability: Items available for loan: University Library (1)Call number: 004.056.55 GUP.
Android hacker's handbook Joshua J Drake...[etal] by
  • Drake, Joshua J ......[et.al]
Publication details: Indiana John Wiley & sons 2014
Availability: Items available for loan: University Library (1)Call number: 004.771.1AND DRA.
Unauthorized access the crisis in online privacy and security Robert H. Sloan and Richard Warner. by
  • Sloan, Robert H
  • Warner, Richard
Publication details: Boca Raton CRC Press 2014
Availability: Items available for loan: University Library (1)Call number: 004.056.53 SLO.
Practical reverse engineering x86, x64, arm, windows kernel, reversing tools, and obfuscation Bruce Dang, Alexandre Gazet and Elias Bachaalany by
  • Dang, Bruce
  • Gazet, Alexandre
  • Bachaalany, Elias
Publication details: Indianapolis John Wiley & Sons 2014
Availability: Items available for loan: University Library (1)Call number: 004.056.53 DAN.
Secure multiparty computation and secret sharing by
  • Cramer, Ronald
  • Damgard, Ivan Bjerre
  • Nielson, Jesper Buus
Publication details: 2015 Cambridge 2015
Availability: Items available for loan: University Library (1)Call number: 004.738.5.057.4 CRA.
Cryptography and network security principles and practice by
  • Stallings, William
Edition: 6th ed.
Publication details: Noida Pearson 2015
Availability: Items available for loan: University Library (4)Call number: 004.056.523 STA "2014";1, ...
Analyzing computer security a threat vulnerability countermeasure approach Charles P. Pfleeger and Shari Lawrence Pfleeger by
  • Pfleeger, Charles P
  • Pfleeger, Shari Lawrence
Publication details: New Delhi Pearson 2014
Availability: Items available for loan: University Library (1)Call number: 004.056 PFL.
Insider computer fraud an in depth framework for detecting and defending against insider it aatacks by
  • Brancik, Kenneth C
Publication details: Boca Raton Aeurobach publications 2008
Availability: Items available for loan: University Library (1)Call number: 004.056.53 BRA.
Securing cyber - physical systems by
  • Pathan, Al-Sakib Khan; ed [ed. by]
Publication details: Boca Raton CRC press 2016
Availability: Items available for loan: University Library (1)Call number: 004.056.53 PAT.
Pages
University Library, CUSAT