Your search returned 13 results.

Sort
Results
Computer security: A management guide by
  • Simpson, Alan
Publication details: Purley Input two-nine 1978
Availability: Items available for loan: University Library (1)Call number: 004.056 SIM .
Secure computers and networks: analysis, design, and implementation by
  • Fisch, Eric A
  • White, Gregory B
Publication details: London CRC Press 2000
Availability: Items available for loan: University Library (1)Call number: 004.72 FIS.
Information security handbook by
  • Hunter, John M. D
Publication details: London Springer-Verlag 2001
Availability: Items available for loan: University Library (1)Call number: 004.056.53 HUN.
Data privacy and security by
  • Salomon, David []
Edition:
Publication details: New York Springer 2003
Availability: Items available for loan: University Library (1)Call number: 004.056.53 SAL.
Network security: private communicaion in a public world by
  • Kaufman, Charlie
  • Perlman, Radia Speciner, Mike
Edition: 2nd ed
Publication details: New Delhi Prentice-Hall of India 2005
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 KAU'"2005".
Firewall fundamentals by
  • Noonan, Wes
  • Dubrawsky, Ido
Publication details: New Delhi Pearson 2006
Availability: Items available for loan: University Library (1)Call number: 004.056.52 NOO.
Computer network security by
  • Kizza, Joseph Migga
Publication details: New Delhi Springer (India) Pvt Ltd 2007
Availability: Items available for loan: University Library (1)Call number: 004.72.056.52 KIZ.
Handbook of information security by
  • Bidgoli, Hossein [ed. by]
Publication details: New Jersey John Wiley 2006
Availability: Items available for reference: University Library : Not for loan (3)Call number: 00 4.056 BID.1, ...
Web hacking: attacks and defense by
  • McClure, Stuart
  • Shah, Saumil Shah, Shreeraj
Publication details: New Delhi Dorling Kindersley 2007
Availability: Not available: University Library : Checked out (1).
Business guide to information security : how to protect your company's IT assets, reduce risks and understand the law by
  • Calder, Alan
Publication details: New Delhi Kogan Page 2006
Availability: Items available for loan: University Library (1)Call number: 004.056 CAL.
disaster recovery handbook: a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets by
  • Wallace, Michael []
  • Webber, Lawrence
Edition:
Publication details: New York Amacom 2004
Availability: Items available for loan: University Library (1)Call number: 65-022.326.5 WAL.
Advances in enterprise information technology security by
  • Khadraoui, Djamel
  • Herrmann,Francine
Publication details: New York Information Science Reference 2007
Availability: Items available for loan: University Library (1)Call number: 004.056.53 KHA.
Profiling hackers:the science of criminal profiling as applied to the world of hacking by
  • Chiesa, Raoul
  • Ducci, Stefania Ciappi, Silvia
Publication details: New York CRC 2009
Availability: Items available for loan: University Library (1)Call number: 004.056.53 CHI.
Pages
University Library, CUSAT