Your search returned 154 results.

Sort
Results
Software defined networks a comprehensive approach by
  • Goransson, Paul
  • Black, Chuck
  • Culver, Timothy
Publication details: London Elsevier 2014
Availability: Items available for loan: University Library (1)Call number: 004.738.5.057.4 GOR/S.
Strengthening deep neural networks making AI less susceptible to adversarial trickery by
  • Warr, Katy
Publication details: Mumbai SPD 2019
Availability: Items available for loan: University Library (1)Call number: 004.89:004.7 WAR/S.
Cybersecurity law by
  • Kosseff, Jeff
Publication details: New Delhi Wiley 2017
Availability: Items available for loan: University Library (1)Call number: 347.77:004 KOS/C.
Supply chain risk management applying secure acquisition principles to ensure a trusted technology product by
  • Sigler, Ken
  • Shoemaker, Dan
  • Kohnke, Anne
Publication details: London CRC press 2018
Availability: Items available for loan: University Library (1)Call number: 658.85 SIG/S.
Introduction to computer networking by
  • Davies , Gerald
Publication details: USA Clanrye international 2018
Availability: Items available for loan: University Library (1)Call number: 004.7 DAV/I.
Commercial and cyber fraud a legal guide to justice for businesses by
  • Smith, Ian
  • Shepherd, David
Publication details: London, Bloomsbury professional; 2019
Availability: Items available for loan: University Library (1)Call number: 347.7:004.7 SMI/C.
Introduction to computer networks and cybersecurity by
  • Amir Hussain
Publication details: New Delhi, Oxford; 2018
Availability: Items available for loan: University Library (1)Call number: 004.72.056.52 AMI/I.
Information security fundamentals by
  • Khalil Mohammad
Publication details: New Delhi: Oxford, 2018
Availability: Items available for loan: University Library (1)Call number: 004.056.53 KHA/I.
Human-computer interaction and cyber security handbook by
  • Moallem, Abbas ed. by
Publication details: London CRC press 2019
Availability: Items available for loan: University Library (1)Call number: 004.72.056.52(035) MOA/H R.
Android programming for beginners by
  • Horton, John
Publication details: Mumbai Packt publishing Ltd. 2015
Availability: Items available for loan: University Library (1)Call number: 004.771.1 HOR/A.
Cybercryptography: applicable cryptography for cyberspace security by
  • Yan, Song Y
Publication details: Switzerland Springer 2019
Availability: Items available for loan: University Library (1)Call number: 004.056.523 YAN/C.
Green information and communication systems for a sustainable future by
  • Srivastava,Rajshree ed
  • Kautish, Sandeep ed
  • Tiwari, Rajeev
Publication details: London CRC press 2020
Availability: Items available for loan: University Library (1)Call number: 621.39:004.7 SRI/G.
Distributed denial of service attacks real-world detection and mitigation by
  • Ozcelik, Ilker
  • Brooks, Richard R
Publication details: Boca Raton CRC Press 2020
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 OZC/D.
Designing data-intensive applications: the big ideas behind reliable,scalable,and maintainable systems by
  • Kleppmann Martin
Publication details: Mumbai Shroff/O'Reilly 2017
Availability: Items available for loan: University Library (1)Call number: 004.65 KLE/D.
Pages
University Library, CUSAT