Your search returned 144 results.

Sort
Results
Cryptography primer secrets and promises by
  • Klein, Philip N
Publication details: New York Cambridge university press 2014
Availability: Items available for loan: University Library (1)Call number: 004.056.55 KLE.
Technocrime, Policing and surveillance by
  • Leman- Langlois, Ste'phane; ed
Series: Routledge frontiers of criminal justice
Publication details: London Routledge 2013
Availability: Items available for loan: University Library (1)Call number: 004.056.53 LEM.
Security controls evaluation, testing and assessment handbook by
  • Johnson, Leighton
Publication details: Waltham Syngress 2016
Availability: Items available for loan: University Library (1)Call number: 004.057.2 JOH.
Operating systems internals and design principles by
  • Stallings, William
Edition: 9th ed.
Publication details: Noida Pearson India education 2014
Availability: Items available for loan: University Library (2)Call number: 004.451.8 STA;1, ...
Cryptography and network security principles and practice William Stallings. by
  • Stallings, William
Edition: 7th ed
Publication details: Chennai Pearson 2019
Availability: Items available for loan: University Library (1)Call number: 004.056.523 STA "2017".
Computer security principles and practice by
  • Stallings, William
  • Brown, Lawrie
Edition: 4th ed
Publication details: New York Pearson 2018
Availability: Items available for loan: University Library (1)Call number: 004.056 STA.
Cyber security engineering a practical approach for systems and software assurance by
  • Mead, Nancy R
  • Woody, Carol C
Publication details: Chennai Pearson 2017
Availability: Items available for loan: University Library (1)Call number: 004.056.53 MEA.
Network security essentials applications and standards by
  • Stallings, William
Edition: 6th ed.
Publication details: England Pearson 2017
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 STA/N.
Hacking by
  • Beaver Kevin
Edition: 6th ed.
Publication details: New Delhi dummies 2018
Availability: Items available for loan: University Library (1)Call number: 004.056.53 BEA/H.
Windows Security Monitoring scenarios and patterns by
  • Miroshnikov,Andrei
Publication details: New Delhi Wiley
Availability: Items available for loan: University Library (1)Call number: 004.451.9 MIR/W.
Trusted computing principles and applications by
  • Feng Dengguo...[et.all]
Publication details: Germany De Gruyter 2018
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 FEN/T.
Big data technologies for monitoring of computer security a case study of the Russian federation by
  • Petrenko Sergei
Publication details: Switzerland Springer 2018
Availability: Items available for loan: University Library (1)Call number: 004.056.53 PET/B.
Introduction to Computer Security by
  • Goodrich, Michael
  • Tamassia, Roberto
Publication details: Pearson Education Limited 2013
Availability: Items available for loan: University Library (1).
Internet of things security challenges, advances and analytics by
  • Patel, Chintan
  • Doshi, Nishant
Publication details: London CRC press 2019
Availability: Items available for loan: University Library (1)Call number: 004.056.53 PAT/I.
Hardware security a hands - on learning approach by
  • Bhunia, Swarup
  • Tehranipoor Mark
Publication details: US MK 2019
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 BHU/H.
Computer and cyber security principles, algorithm, applications, and perspectives by
  • Gupta, Brij B; ed. by
  • Agrawal, Dharma P; ed. by
  • Wang, Haoxiang; ed. by
Publication details: London CRC press 2019
Availability: Items available for loan: University Library (1)Call number: 004.7.056.53 COM.
Cybersecurity law by
  • Kosseff, Jeff
Publication details: New Delhi Wiley 2017
Availability: Items available for loan: University Library (1)Call number: 347.77:004 KOS/C.
Supply chain risk management applying secure acquisition principles to ensure a trusted technology product by
  • Sigler, Ken
  • Shoemaker, Dan
  • Kohnke, Anne
Publication details: London CRC press 2018
Availability: Items available for loan: University Library (1)Call number: 658.85 SIG/S.
Cyber security and privacy in cyber physical systems by
  • Malesh, Yassine;ed. by
Publication details: London CRC press 2019
Availability: Items available for loan: University Library (1)Call number: 004.72.056.52 CYB.
Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteraction by
  • Flammini, Francesco ed. by
Publication details: Switzerland Springer 2019
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 RES.
Pages
University Library, CUSAT