Your search returned 13 results.

Sort
Results
Information warfare and security by
  • Denning, Dorothy E
Publication details: Massachusetts Addison Wesley 1999
Availability: Items available for loan: University Library (1)Call number: 004.056.53 DEN.
Solaris security by
  • Gregory, Peter H
Publication details: Delhi Addison Wesley 2000
Availability: Items available for loan: University Library (1)Call number: 004.451.9SOL GRE.
TechTV's security alert: stories of real people protecting themselves from identity theft, scams and viruses by
  • Worley, Becky
Publication details: Indiana New riders Publishing 2004
Availability: Items available for loan: University Library (1)Call number: 004.056.53 WOR.
Network security: a hacker's perspective by
  • Fadia, Ankit
Edition: 2nd ed.
Publication details: Macmillan 2006
Availability: Items available for loan: University Library (1)Call number: 004.72.056.53 FAD.
ethical guide to hacking mobile phones by
  • Fadia, Ankit []
Edition:
Publication details: New Delhi Macmillan India Ltd 2006
Availability: Items available for loan: University Library (1)Call number: 621.395.721.5:004.49 FAD.
Google hacking: an ethical guide by
  • Fadia, Ankit
  • Goel, Diwakar
Publication details: New Delhi Vikas publishing house 2007
Availability: Items available for loan: University Library (1)Call number: 004.056.53 FAD.
Web hacking: attacks and defense by
  • McClure, Stuart
  • Shah, Saumil Shah, Shreeraj
Publication details: New Delhi Dorling Kindersley 2007
Availability: Items available for loan: University Library (1)Call number: 004.056.53 MCC.
Dark Side of software engineering evil on computing projects Johann Rost and Robert L.Glass by
  • Rost, Johann
Publication details: New Jersey John Wiley and sons 2011
Availability: Items available for loan: University Library (1)Call number: 004.413.4 ROS.
Insider computer fraud an in depth framework for detecting and defending against insider it aatacks by
  • Brancik, Kenneth C
Publication details: Boca Raton Aeurobach publications 2008
Availability: Items available for loan: University Library (1)Call number: 004.056.53 BRA.
Securing cyber - physical systems by
  • Pathan, Al-Sakib Khan; ed [ed. by]
Publication details: Boca Raton CRC press 2016
Availability: Items available for loan: University Library (1)Call number: 004.056.53 PAT.
Unified communications forensics anatomy of common UC attacks by
  • Grant, Nicholas
  • Shaw, Joseph W
Publication details: Waltham Syngress 2014
Availability: Items available for loan: University Library (1)Call number: 004.738.5.057.4 GRA.
Hacking by
  • Beaver Kevin
Edition: 6th ed.
Publication details: New Delhi dummies 2018
Availability: Items available for loan: University Library (1)Call number: 004.056.53 BEA/H.
Begining ethical hacking with kali linux Computational techniques for resolving security issues by
  • Sanjib Sinha
Publication details: West Bengal Apress 2018
Availability: Items available for loan: University Library (1)Call number: 004.056.53 SAN/B.
Pages
University Library, CUSAT