Your search returned 35 results.

Sort
Results
Cryptography and network security principles and practice William Stallings. by
  • Stallings, William
Edition: 7th ed
Publication details: Chennai Pearson 2019
Availability: Items available for loan: University Library (1)Call number: 004.056.523 STA "2017".
Cyber security engineering a practical approach for systems and software assurance by
  • Mead, Nancy R
  • Woody, Carol C
Publication details: Chennai Pearson 2017
Availability: Items available for loan: University Library (1)Call number: 004.056.53 MEA.
Hacking by
  • Beaver Kevin
Edition: 6th ed.
Publication details: New Delhi dummies 2018
Availability: Items available for loan: University Library (1)Call number: 004.056.53 BEA/H.
Cyber guerilla by
  • Haaster Jelle Van
  • Gevers, Rickey
  • Sprengers, Martijn
Publication details: US Syngress 2016
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 HAA/C.
Trusted computing principles and applications by
  • Feng Dengguo...[et.all]
Publication details: Germany De Gruyter 2018
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 FEN/T.
Staying safe online in simple steps by
  • Ballew, Joli
Publication details: Pearson Education Limited 2012
Availability: Items available for loan: University Library (1).
Staying safe online in simple steps by
  • Ballew, Joli
Publication details: Pearson Education Limited 2012
Availability: No items available.
Computer and cyber security principles, algorithm, applications, and perspectives by
  • Gupta, Brij B; ed. by
  • Agrawal, Dharma P; ed. by
  • Wang, Haoxiang; ed. by
Publication details: London CRC press 2019
Availability: Items available for loan: University Library (1)Call number: 004.7.056.53 COM.
Machine learning for computer and cyber security principles, algorithms, and practices by
  • Gupta Brij, B ed.by
  • Sheng, Michael ed.by
Publication details: London CRC press 2019
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 MAC.
Strengthening deep neural networks making AI less susceptible to adversarial trickery by
  • Warr, Katy
Publication details: Mumbai SPD 2019
Availability: Items available for loan: University Library (1)Call number: 004.89:004.7 WAR/S.
Cybersecurity law by
  • Kosseff, Jeff
Publication details: New Delhi Wiley 2017
Availability: Items available for loan: University Library (1)Call number: 347.77:004 KOS/C.
Supply chain risk management applying secure acquisition principles to ensure a trusted technology product by
  • Sigler, Ken
  • Shoemaker, Dan
  • Kohnke, Anne
Publication details: London CRC press 2018
Availability: Items available for loan: University Library (1)Call number: 658.85 SIG/S.
Information security fundamentals by
  • Khalil Mohammad
Publication details: New Delhi: Oxford, 2018
Availability: Items available for loan: University Library (1)Call number: 004.056.53 KHA/I.
Human-computer interaction and cyber security handbook by
  • Moallem, Abbas ed. by
Publication details: London CRC press 2019
Availability: Items available for loan: University Library (1)Call number: 004.72.056.52(035) MOA/H R.
Distributed denial of service attacks real-world detection and mitigation by
  • Ozcelik, Ilker
  • Brooks, Richard R
Publication details: Boca Raton CRC Press 2020
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 OZC/D.
Pages
University Library, CUSAT