Your search returned 144 results.

Sort
Results
Firewall fundamentals by
  • Noonan, Wes
  • Dubrawsky, Ido
Publication details: New Delhi Pearson 2006
Availability: Items available for loan: University Library (1)Call number: 004.056.52 NOO.
Incident response and computer forensics by
  • Prosise, Chris []
  • Mandia, Kevin
Edition: 2nd ed
Publication details: New Delhi Tata McGraw-Hill 2006
Availability: Items available for loan: University Library (1)Call number: 343.98:004 PRO.
Computer network security by
  • Kizza, Joseph Migga
Publication details: New Delhi Springer (India) Pvt Ltd 2007
Availability: Items available for loan: University Library (1)Call number: 004.72.056.52 KIZ.
Handbook of information security by
  • Bidgoli, Hossein [ed. by]
Publication details: New Jersey John Wiley 2006
Availability: Items available for reference: University Library : Not for loan (3)Call number: 00 4.056 BID.1, ...
Codes: the guide to secrecy from ancient to modern times by
  • Mollin, Richard A
Publication details: Boca Raton Chapman and Hall/CRC 2005
Availability: Items available for loan: University Library (1)Call number: 004.056.55 MOL.
Introduction to computer security by
  • Bishop, Matt
  • Venkatramanayya, Sathyanarayana S
Publication details: New Delhi Pearson Education 2005
Availability: Items available for loan: University Library (1)Call number: 004.056 BIS.
Web hacking: attacks and defense by
  • McClure, Stuart
  • Shah, Saumil Shah, Shreeraj
Publication details: New Delhi Dorling Kindersley 2007
Availability: Items available for loan: University Library (1)Call number: 004.056.53 MCC.
Business guide to information security : how to protect your company's IT assets, reduce risks and understand the law by
  • Calder, Alan
Publication details: New Delhi Kogan Page 2006
Availability: Items available for loan: University Library (1)Call number: 004.056 CAL.
disaster recovery handbook: a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets by
  • Wallace, Michael []
  • Webber, Lawrence
Edition:
Publication details: New York Amacom 2004
Availability: Items available for loan: University Library (1)Call number: 65-022.326.5 WAL.
Advances in enterprise information technology security by
  • Khadraoui, Djamel
  • Herrmann,Francine
Publication details: New York Information Science Reference 2007
Availability: Items available for loan: University Library (1)Call number: 004.056.53 KHA.
Grid computing security by
  • Chakrabarti, Anirban
Publication details: Heidelberg Springer 2007
Availability: Items available for loan: University Library (1)Call number: 004.72 CHA.
secure online business handbook: e-commerce, IT functionality and business continuity by
  • Reuvid, Jonathan []
Edition:
Publication details: New Delhi Kogan page India 2007
Availability: Items available for loan: University Library (1)Call number: 004.056.53 REU.
Insider computer fraud:an in-depth framework for detecting and defending against insider IT attacks by
  • Brancik, Kenneth C
Publication details: New York Auerbach 2008
Availability: Items available for loan: University Library (1)Call number: 004.056.53 BRA.
Profiling hackers:the science of criminal profiling as applied to the world of hacking by
  • Chiesa, Raoul
  • Ducci, Stefania Ciappi, Silvia
Publication details: New York CRC 2009
Availability: Items available for loan: University Library (1)Call number: 004.056.53 CHI.
Machine learning in cyber trust: security, privacy and reliability by
  • Tsai, Jeffrey J P [ed.by.]
  • Yu, Philip S
Publication details: New York Springer 2009
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 TSA.
Digital privacy theory,technologies, and practices by
  • Acquisti, Alessandro [ed.by]
  • ...[et.al.]
Publication details: London Auerbach Publications 2008
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 ACQ.
Smart cards, tokens, security and applications Keith E Mayes and Konstantinos Markantonakis by
  • Mayes,Keith E
  • Markantonakis, Konstantinos
Publication details: New York Springer 2008
Availability: Items available for loan: University Library (1)Call number: 681.5:004.087.5 MAY.
Computer Security Handbook Seymour Bosworth, M.E. Kabay and Eric Whyne by
  • Bosworth, Seymour., ed [ed.by]
  • Kabay, M.E., ed. by Whyne, Eric., ed.by
Edition: 5th ed.
Publication details: New Jersey John Wiley 2009
Availability: Items available for reference: University Library : Not For Loan (2)Call number: 004.056(035) BOS.1 R, ...
Network defense by
  • Weaver,Randy
Publication details: Singapore Course technology 2007
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 WEA.
Fighting terror online the convergence of security, technnology, and the law by
  • Golumbic, Martin Charles
Publication details: New York Springer 2008
Availability: Items available for loan: University Library (1)Call number: 347.77:681.14 GOL.
Pages
University Library, CUSAT