Your search returned 16 results.

Sort
Results
Secrets and lies: digital security in a networked world by
  • Schneier, Bruce
Publication details: New York John Wiley 2000
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 SCH.
UMTS security by
  • Niemi, Valtteri []
  • Nyberg, Kaisa
Edition:
Publication details: England John Wiley & Sons 2003
Availability: Items available for loan: University Library (1)Call number: 621.395.721.5 NIE.
Principles of secure network systems design by
  • Ghosh, Sumit
Publication details: New York Springer-Verlag 2002
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 GHO.
Handbook of information security by
  • Bidgoli, Hossein [ed. by]
Publication details: New Jersey John Wiley 2006
Availability: Items available for reference: University Library : Not for loan (3)Call number: 00 4.056 BID.1, ...
Digital privacy theory,technologies, and practices by
  • Acquisti, Alessandro [ed.by]
  • ...[et.al.]
Publication details: London Auerbach Publications 2008
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 ACQ.
Network defense by
  • Weaver,Randy
Publication details: Singapore Course technology 2007
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 WEA.
Corporate computer and network security by
  • Panko, Raymond R
Edition: 2nd ed
Publication details: Prentice Hall 2010
Availability: Items available for loan: University Library (1).
Cryptography and network security by
  • Gupta, Prakash C
Publication details: Delhi PHI learning private limited 2015
Availability: Items available for loan: University Library (1)Call number: 004.056.55 GUP.
Cryptography and network security principles and practice William Stallings. by
  • Stallings, William
Edition: 7th ed
Publication details: Chennai Pearson 2019
Availability: Items available for loan: University Library (1)Call number: 004.056.523 STA "2017".
Cyber security engineering a practical approach for systems and software assurance by
  • Mead, Nancy R
  • Woody, Carol C
Publication details: Chennai Pearson 2017
Availability: Items available for loan: University Library (1)Call number: 004.056.53 MEA.
Hacking by
  • Beaver Kevin
Edition: 6th ed.
Publication details: New Delhi dummies 2018
Availability: Not available: University Library : Checked out (1).
Trusted computing principles and applications by
  • Feng Dengguo...[et.all]
Publication details: Germany De Gruyter 2018
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 FEN/T.
Computer and cyber security principles, algorithm, applications, and perspectives by
  • Gupta, Brij B; ed. by
  • Agrawal, Dharma P; ed. by
  • Wang, Haoxiang; ed. by
Publication details: London CRC press 2019
Availability: Items available for loan: University Library (1)Call number: 004.7.056.53 COM.
Cybersecurity law by
  • Kosseff, Jeff
Publication details: New Delhi Wiley 2017
Availability: Items available for loan: University Library (1)Call number: 347.77:004 KOS/C.
Supply chain risk management applying secure acquisition principles to ensure a trusted technology product by
  • Sigler, Ken
  • Shoemaker, Dan
  • Kohnke, Anne
Publication details: London CRC press 2018
Availability: Items available for loan: University Library (1)Call number: 658.85 SIG/S.
Human-computer interaction and cyber security handbook by
  • Moallem, Abbas ed. by
Publication details: London CRC press 2019
Availability: Items available for loan: University Library (1)Call number: 004.72.056.52(035) MOA/H R.
Pages
University Library, CUSAT