Your search returned 30 results.

Sort
Results
1.
Image from Google Jackets
Image from OpenLibrary
Computer crime and computer forensic Tewari R K; Sastry P K; Ravikumar K V by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Delhi Selective & Scientific Books 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: Y:45(D65,8(B)) P2;1.

2.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Cyber Attacks: Protecting national infrastructure Amoroso Edward G by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Amsterdam Butterworth- Heinemann 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q3.

3.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Handbook on securing cyber-physical critical infrastructure : foundations and challenges Das Sajal K; Kant Krishna; Zhang Nan by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Amsterdam Morgan Kaufmann 2012
Availability: Items available for reference: Central Science Library: Not for loan (1)Collection, call number: D65,8(B):71:(894)g Q2 RR.

4.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Securing cloud mobility : a practitioner's guide Lim Ian; Coolidge E Coleen; Hourani Paul by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q3 TD.

5.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Wireless security Osterhage Wolfgang by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):7:(894) Q2 TD.

6.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Case studies in secure computing: achievements and trends Issac Biju Ed.; Israr Nauman Ed. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC 2015
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q5.

7.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Computer crime and computer forensics Tewari R.K; Sastry P.K; Ravikumar K.V by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Delhi Select publishers 2002
Availability: Items available for loan: Central Science Library (1)Collection, call number: Y:45(D65,8(B)) P2.

8.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Digital watermarking and steganography: Fundamentals and techniques Shih Frank Y by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: London Crc Press 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P8 TD.

9.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Wireless mobile internet security Rhee Man Young by
Edition: 2
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Jersey WIley 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,48M:71:(894) Q3;1.

10.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Network attacks and defenses : a hands on approach Trabelsi Zouheir; Hayawi Kadhim; Braiki Arwa Al; WMathe Sujith Samuel by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York CRC Press 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71:(894) Q3 TB.

11.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Multimedia communication security:recent advances by Lian Shiguo Ed. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York Nova Science Publishers Inc 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P8 TB.

12.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Security in wireless mesh networks by Zhang Yan Ed.; Zheng Jun Ed.; Hu Honglin Ed. by Series: Wireless networks and mobile communications
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Pres 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):7:(894) P9 TD.

13.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
WiMax security and quality of service:an end-to-end perspective by Tang Seok Yee Ed.; Muller Peter Ed.; Sharif Hamid R Ed. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Chichester Wiley 2010
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):7:(894) Q0 TD.

14.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
SIP secuity by Sisalem Dorgham; Floroiu John; Kuthan Jiri; Abend Ulrich; Schulzrinne Henning by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Chichester Wiley 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P9 TD.

15.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Handbook of database security: applications and trends by Gertz Michael; Jajodia Sushil Ed. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York Springer-Science+Business Media 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):3:(894)g P8 TD.

16.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Information security management metrics:definitive guide to effective security monitoring and measurement by Brotby W Krag by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Pres 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P9 TD.

17.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Implementing the ISO/IEC 27001 information security management system standard by Humphreys Edward by Series: Artech house information security and privacy series
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boston Artech House 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P7 TD.

18.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Transportation infrastructure security utilizing intelligent transportation systems by Fries Ryan; Chowdhury Mashrur; Brummond Jeffrey by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Jersey Wiley 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P9 TD.

19.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Digital identitiy management:perspectives on the technological, business and social implications by Birch David G W Ed. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: England Gower 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P7 TD.

20.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Collaborative computer security and trust management by Seigneur Jean-Marc; Slagell Adam by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Hershey Information Science Reference 2010
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q0 TD.

21.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Security risk assessment handbook: A complete guide for performing security risk assessments by Landoll Douglas J by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton Auerbach Publications 2006
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894)k P6 TD.

22.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Practical internet security by Vacca John R by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New York Springer 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71:(894) P7 TD.

23.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Security strategy from requirements to reality by Stackpole Bill; Oksendahl Eric by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Pres 2011
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q1 TD.

24.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Cryptography, information theory and error-correction: A handbook for the 21st century by Bruen Aiden A; Forcinito Mario A by Series: Wiley interscience series in discrete mathematics and optimization
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: New Jersey John Wiley & Sons 2005
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P5 TD.

25.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Adaptive security management architecture by Tiller James S by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Pres 2011
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71:(894) Q1 TD.

26.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Windows forensic analysis DVD tool kit by Carvey Harlan by
Edition: 2
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Burlington Syngress Publishing Inc. 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B)91W:(894) P9 TD.

27.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Mobile communication systems and security by Rhee Man Young by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Chichester John Wiley 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,48M:(894) P9 TD.

28.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Understanding voice over IP security Johnston Alan B; Piscitello David M by Series: Artech House telecommunication library
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boston Artech House 2006
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71:(894) P6 TD.

29.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Information security risk analysis Peltier Thomas R by
Edition: 2
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Press 2005
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P5 TD.

30.
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary
See Baker & Taylor
Image from Baker & Taylor
Ad Hoc Networks Telecommunications and Game Theory / by Malek Benslama, Hadj Batatia and Mohamed Lamine Boucenna by Series: Focus: Networks and Telecommunications series
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: London: Wiley ISTE, 2015
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,48M Q5.