Your search returned 26 results.

Sort
Results
Supply chain risk management applying secure acquisition principles to ensure a trusted technology product by
  • Sigler, Ken
  • Shoemaker, Dan
  • Kohnke, Anne
Publication details: London CRC press 2018
Availability: Items available for loan: University Library (1)Call number: 658.85 SIG/S.
Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteraction by
  • Flammini, Francesco ed. by
Publication details: Switzerland Springer 2019
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 RES.
Art of access strategies for acquiring public records by
  • Cuillier,David
  • Charles N,Davis
Edition: 2nd ed.
Publication details: UK Sage 2020
Availability: Items available for loan: University Library (1)Call number: 342.72/.73(093.2)(73) CUI/A.
Cybercryptography: applicable cryptography for cyberspace security by
  • Yan, Song Y
Publication details: Switzerland Springer 2019
Availability: Items available for loan: University Library (1)Call number: 004.056.523 YAN/C.
Investigation on relational database watermarking services framework for content security by
  • Unnikrishnan, K
  • Guided by : Prof. (Dr.). K.V. Pramod
Publication details: Kochi Department of Computer Applications 2019
Availability: Items available for reference: University Library : Not for loan (1)Call number: 004.056.55 UNN/I T.
Breaking away : how to regain control over our data, privacy and autonomy by
  • Stucke, Maurice E
Publication details: New York Oxford University Press 2022
Availability: Not available: University Library : Ordered (1).
Pages
University Library, CUSAT