Your search returned 145 results.

Sort
Results
51.
Grid computing security by Chakrabarti Anirban by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Berlin Springer-Verlag 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):7:(894) P7 TD.

52.
Information security management metrics:definitive guide to effective security monitoring and measurement by Brotby W Krag by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Pres 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P9 TD.

53.
Implementing the ISO/IEC 27001 information security management system standard by Humphreys Edward by Series: Artech house information security and privacy series
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boston Artech House 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P7 TD.

54.
Role-based access control by Ferraiolo David F; Kuhn D Richard; Chandramouli Ramaswamy by Series: Information security and privacy series
Edition: 2
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Norwood Artech House 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P3:P7 TD.

55.
Users's guide to cryptography and standards by Dent Alexander W; Mitchell Chris J by Series: Artech house computer security series
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boston Artech House Inc. 2005
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P5 TD.

56.
Proceedings on security and privacy-silver linings in the cloud by Rannenberg Kai Ed.; Varadharajan Vijay Ed.; Webs Christian Ed. by Series: IFIP advances in information and communication technology, 330
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Berlin Springer 2010
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894)p1,Q0 Q0 TD.

57.
Security software development: Assessing and managing security risks by Ashbaugh Douglas A by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Rotan CRC Press 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B)92:894 P9 TB.

58.
Computer security and penetration testing by Basta Alfred; Halton Wolf by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boston Thomson 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):81 P8 TD.

59.
Computer security and cryptography by Konheim Alan G by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Jersey John Wiley & Sons, Inc, 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P7 TD.

60.
Digital identitiy management:perspectives on the technological, business and social implications by Birch David G W Ed. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: England Gower 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P7 TD.

61.
Cryptanalysis of RSA and its variants by Hinek M Jason by Series: Champman and Hall / CRC cryptography and network security
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Pres 2010
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q0 TD.

62.
Collaborative computer security and trust management by Seigneur Jean-Marc; Slagell Adam by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Hershey Information Science Reference 2010
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q0 TD.

63.
Applications of data mining in computer security by Barbara Daniel Ed.; Jajodia Sushil Ed. by Series: Advances in information security
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Springer 2002
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P2 TD.

64.
Embedded cryptographic hardware:design and security by Nedjah Nadia Ed.; Mourelle Luiza de Macedo Ed. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York Nova Science Publishers 2005
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):81 P5 TD.

65.
Information assurance, security and privacy services by Rao H Raghav Ed.; Upadhyaya Shambhu Ed. by Series: Handbooks in information systems, 4
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: United Kingdom Emerald 2009
Availability: Items available for reference: Central Science Library: Not for loan (1)Collection, call number: D65,8(B):(894)g P9 RR.

66.
Data-driven block ciphers for fast telecommunication systems by Moldovyan Nikolay A; Moldovyan Alexander A by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York Auerbach Publications 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P8 TD.

67.
Security of information and communication networks by Kartalopoulos Stamatios V by Series: IEEE press series on information and communication and network security
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Jersey Wiley 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P9 TD.

68.
Security risk assessment handbook: A complete guide for performing security risk assessments by Landoll Douglas J by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton Auerbach Publications 2006
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894)k P6 TD.

69.
Trustworthy computing: Analytical and quantitative engineering evaluation by Sahinoglu M by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Jersey John Wiley & Sons, Inc, 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P7 TOR.

70.
Computer security fundamentals by Easttom Chuck by Series: Books in the security series
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Jersey Pearson Education, Inc. 2006
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P6 TD.

71.
Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography by Dube Roger by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Jersey Wiley 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P8 TD.

72.
Security strategy from requirements to reality by Stackpole Bill; Oksendahl Eric by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Pres 2011
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q1 TD.

73.
Digital rights management for e-commerce systems by Tsolis Dimitrios; Drossos Lambros; Sioutas Spyros; Papatheodorou Theodore by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Hershey Infomation Science Reference 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):715 P9 TD.

74.
Cryptography, information theory and error-correction: A handbook for the 21st century by Bruen Aiden A; Forcinito Mario A by Series: Wiley interscience series in discrete mathematics and optimization
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Jersey John Wiley & Sons 2005
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P5 TD.

75.
Applied cryptography: protocols, algorithms, and source code in C by Schneier Bruce by
Edition: 2
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York John Wiley & Sons 1996
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) N6.

76.
Managing information security by Vacca John R Ed. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Amsterdam Elsevier 2010
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q0 TD.

77.
Secure and resilient software development by Merkow Mark S; Raghavan Lakshmikanth by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Pres 2010
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B)92:(894) Q0 TD.

78.
Windows forensic analysis DVD tool kit by Carvey Harlan by
Edition: 2
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Burlington Syngress Publishing Inc. 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B)91W:(894) P9 TD.

79.
Oracle identity management:governance,risk and compliance architecture by Pohlman Marlin B by
Edition: 3
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Pres 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B)940r:(8) P8 TD.

80.
Introduction to computer security by Bishop Matt; Venkatramanayya Sathyanarayana S by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Delhi PHI Learning Education 2006
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P6.

81.
Managing an information security and privacy awareness and training program by Herold Rebecca by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton Auerbach Publications 2005
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(B94) P5 TD.

82.
Managing information security and privacy awareness and training program by Herold Rebecca by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton Auerbach Publications 2005
Availability: No items available.

83.
Data protection:governance, risk management, and compliance by Hill David G by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton Auerbach Publications 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):81 P9.

84.
Distributed systems security:issues, processes and solutions by Belapukar Abhijit; Chakrabarti Anirban; Ponnapalli Harigopal; Varadarajan Niranjan; Padmanabhuni Srinivas; Sundarrajan Srikanth by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Chichester Wiley 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P9 TD.

85.
Security in computing by Pfleeger Charles P; Pfleeger Lawrence; Shah Deven by
Edition: 4
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Delhi Prentice Hall 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P3;P9.

86.
Information security architecture: An integrated approach to security in the organization by Killmeyer Jan by
Edition: 2
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton Auerbach Publications 2006
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P6 TD.

87.
Digital watermarking and steganography by Cox Ingemar J; Miller Matthew L; Bloom Jeffrey A; Fridrich Jessica; Kalker Ton by Series: Morgan Kaufmann series in multimedia information and systems
Edition: 2
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Amsterdam Elsevier Inc. 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P8 TD.

88.
Microsoft windows security fundamentals by Clercq Jan de; Grillenmeier Guido by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Amsterdam Elsevier Digital Press 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B)91W:(894) P7 TD.

89.
Computer and information security handbook by Vacca John R Ed. by Series: Morgan Karfmann series in computer security
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Amsterdam Elsevier 2009
Availability: Items available for reference: Central Science Library: Not for loan (1)Collection, call number: D65,8(B):(894)g P9 RR.

90.
Information security management:concepts and practice by Raggad Bel G by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Pres 2010
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q0 TD.

91.
Information assurance: dependability and security in networked systems by Qian Yi; Joshi James; Tipper David; Krishnamurthy Prashant by Series: Morgan kaufmann series in networking
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Amsterdam Elsevier 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):7:(894) P8 TD.

92.
Security complete Security complete by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Delhi BPB Publications 2001
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P1.

93.
Designing security architecture solutions by Jay Ramachandran Ramachandran Jay by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York John Wiley Sons, Ltd. 2002
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P2.

94.
Evaluating indirect and direct classification techniques for network intrusion detection Ibrahim Nawal H by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Ann Arbor ProQuest Information and Learning Company 2004
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4 TD.

95.
Security technologies for the world wide web Oppliger Rolf by Series: Computer security series
Edition: 2
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boston Artech House 2003
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B).71:(894) P3 TD.

96.
Digital defense :what you should know about protecting your company's assets Parenty Thomas J by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boston Harvard Business School Press 2003
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):715:(894) P3.

97.
Soft computing techniques for intrusion detection Gomez Jonatan by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Ann Arbor ProQuest Information and Learning Company 2004
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4 TD.

98.
Guide to elliptic curve cryptography Hankerson Darrel; Menezes Alfred; Vanstone Scott by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York Springer-Verlag 2004
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P4;1 TD.

99.
Information warfare: Corporate attack and defence in a digital world Hutchinson Bill; Warren Mat by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Oxford Butterworth Heinemann 2002
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B),2A P1 TD.

100.
Halting the hacker Pipkin Donald L by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Jersey Prentice Hall PTR 1997
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) N7.