Your search returned 36 results.

Sort
Results
Multicost and group security by
  • Hardjono, Thomas
  • Dondeti, Lakshminath R
Series: (Artech house computer security series)
Publication details: Boston Artech 2003
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 HAR.
Virtual Private Networks : Making the Right Connection by
  • Fowler, Dennis
Publication details: San Francisco Morgan Kaufmann 1999
Availability: Items available for loan: University Library (1)Call number: 004.738 FOW.
Secrets and lies: digital security in a networked world by
  • Schneier, Bruce
Publication details: New York John Wiley 2000
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 SCH.
SSL and TSL essentials: securing the web by
  • Thomas, Stephen
Publication details: New York John Wiley 2000
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 THO.
Internet and wireless security by
  • Temple, Robert [ed. by]
  • Regnault, John
Publication details: London The Institution of Electrical Engineers 2002
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 TEM.
CCSP selfstudy CCSP cisco secure PIX firewall advanced exam certification guide by
  • Bastien, Greg
  • Degu, Christian Abera
Publication details: Delhi Pearson Education 2003
Availability: Items available for loan: University Library (1)Call number: 004.056.52 BAS.
UMTS security by
  • Niemi, Valtteri []
  • Nyberg, Kaisa
Edition:
Publication details: England John Wiley & Sons 2003
Availability: Items available for loan: University Library (1)Call number: 621.395.721.5 NIE.
Control and security of e-commerce by
  • Smith, Gordon E
Publication details: New Jersey John Wiley 2004
Availability: Items available for loan: University Library (1)Call number: 004.738.5:339 SMI.
Principles of secure network systems design by
  • Ghosh, Sumit
Publication details: New York Springer-Verlag 2002
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 GHO.
Handbook of information security by
  • Bidgoli, Hossein [ed. by]
Publication details: New Jersey John Wiley 2006
Availability: Items available for reference: University Library : Not for loan (3)Call number: 00 4.056 BID.1, ...
Software security:theory, programming, and practice by
  • Sinn Richard
Publication details: Singapore Course Technology 2008
Availability: Items available for loan: University Library (1)Call number: 004.056 SIN.
Digital privacy theory,technologies, and practices by
  • Acquisti, Alessandro [ed.by]
  • ...[et.al.]
Publication details: London Auerbach Publications 2008
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 ACQ.
Network defense by
  • Weaver,Randy
Publication details: Singapore Course technology 2007
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 WEA.
Introduction to computer networks and cybersecurity Chwan-Hwa Wu and J David Irwin by
  • Wu, Chwan - Hwa
Publication details: Boca Raton CRC 2013
Availability: Items available for loan: University Library (1)Call number: 004.7.056.53 WUC.
Corporate computer and network security by
  • Panko, Raymond R
Edition: 2nd ed
Publication details: Prentice Hall 2010
Availability: Items available for loan: University Library (1).
Cryptography and network security by
  • Gupta, Prakash C
Publication details: Delhi PHI learning private limited 2015
Availability: Items available for loan: University Library (1)Call number: 004.056.55 GUP.
Introduction to information security and cyber laws Surya Prakash Tripathi, Ritendra Goel and Praveen Kumar Shukla by
  • Tripathi, Surya Prakash
  • Goel, Ritendra
  • Shukla, Praveen Kumar
Publication details: New Delhi Dreamtech press 2014
Availability: Items available for loan: University Library (1)Call number: 004.056.53 TRI.
Iris biometric model for secured network access by
  • Khoury, Franjieh El
Publication details: Boca Raton Taylor & Francis 2013
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 KHO.
Group theoretic cryptography by
  • Vasco, Maria Isabel Gonzalez
  • Steinwandt, Rainer
Series: Chapman & Hall/CRC cryptography and network security
Publication details: Boca Raton CRC press 2015
Availability: Items available for loan: University Library (1)Call number: 004.056.523 VAS.
Security for multihop wireless networks by
  • Khan, Shafiullah; ed
  • Lloret Mauri, Jaime; ed. by
Publication details: Boca Raton CRC Press 2016
Availability: Items available for loan: University Library (1)Call number: 621.39:004.77 KHA/S.
Pages
University Library, CUSAT