Your search returned 15 results.

Sort
Results
Wireless security: models, threats and solutions by
  • Nichols, Randall K
  • Lekkas, Panos C
Publication details: New Delhi Tata McGraw-Hill 2006
Availability: Items available for loan: University Library (1)Call number: 621.395.721.5:004.056 NIC.
Internet and wireless security by
  • Temple, Robert [ed. by]
  • Regnault, John
Publication details: London The Institution of Electrical Engineers 2002
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 TEM.
UMTS security by
  • Niemi, Valtteri []
  • Nyberg, Kaisa
Edition:
Publication details: England John Wiley & Sons 2003
Availability: Items available for loan: University Library (1)Call number: 621.395.721.5 NIE.
Security of e-systems and computer networks by
  • Obaidat, Mohammad S
Publication details: Cambridge Cambridge University Press 2007
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 OBA.
Digital audio watermarking techniques and technologies : applications and benchmarks by
  • Cvejic, Nedeljko [ed.by]
  • Sppannen, Tapio
Publication details: New York Information science reference 2008
Availability: Items available for reference: University Library : Not For Loan (1)Call number: 004.056.55 CVE R.
Security of mobile communications by
  • Boudriga, Noureddine
Publication details: Boca Raton CRC 2010
Availability: Items available for loan: University Library (1)Call number: 621.395.721.5 BOU.
Managed code rootkits hooking into runtime environments by
  • Metula, Erez
Publication details: Amsterdam Elsevier 2011
Availability: Items available for loan: University Library (1)Call number: 004.491 MET.
Securing the smart grid next generation power grid security Tony Flick, Justin Morehouse; ed.by Christophe Veltsos by
  • Flick, Tony
  • Morehouse, Justin
  • Veltsos, Christopher; ed.by
Publication details: Massachusetts Syngress 2011
Availability: Items available for loan: University Library (1)Call number: 621.315.032.24 FLI.
Mobile communication systems and security by
  • Rhee, Man Young
Publication details: Singapore John Wiley 2009
Availability: Items available for loan: University Library (1)Call number: 621.395.721.5 RHE.
MIS managing information systems in business government and society by
  • De, Rahul
Publication details: New Delhi Wiley India 2012
Availability: Items available for loan: University Library (1)Call number: 658:007 DER.
Fundamentals of information systems security David Kim and Michael G Soplomon by
  • Kim, David
  • Solomon, Michael G
Edition: 2nd. ed
Publication details: Wellstreet Jones & Bartlett Learning 2014
Availability: Items available for loan: University Library (1)Call number: 004.056.53 KIM.
Access control, authentication and public key infrastructure Mike Chapple...[et.al] by
  • Chapple, Mike...[et.al]
Series: Information systems security and assurance series
Edition: 2nd ed.
Publication details: Burlington Jones and Bartlett learning 2014
Availability: Items available for loan: University Library (1)Call number: 004.056.523 CHA.
Securing cyber - physical systems by
  • Pathan, Al-Sakib Khan; ed [ed. by]
Publication details: Boca Raton CRC press 2016
Availability: Items available for loan: University Library (1)Call number: 004.056.53 PAT.
Trusted computing for embedded systems by
  • Candaele, Bernard; ed
  • Soudris, Dimitrios;ed.by
  • Anagnostopoulos, Iraklis ; ed.by
Publication details: Newyork Springer international publishing 2015
Availability: Items available for loan: University Library (1)Call number: 004.031.6:004.056 CAN.
Introduction to Computer Security by
  • Goodrich, Michael
  • Tamassia, Roberto
Publication details: Pearson Education Limited 2013
Availability: Items available for loan: University Library (1).
Pages
University Library, CUSAT