Refine your search

Your search returned 212 results.

Sort
Results
101.
The shellcoder's handbook: Discovering and expoliting security holes Chris Anley, John Heasman, Felix "FX" Lindner, Gerardo Richarte by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Wiley Publishing, 2007
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 ANL/S.

102.
Image authentication using visual cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for reference: IIITM-K: Not for loan (1).

103.
Security analysis and solutions of ruby-on-rails web applications Ahkil N by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: CSIS 2014-16 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

104.
Stacked de-noising auto-encoder based object tracking and detection using extreme learning machine Jitha P Nair by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: M Phil CS 2015-16 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

105.
Preventing security vulnerabilities in ruby on rails web application Manoj Debbarma by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: CSIS 2014-16 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

106.
Design and implementation of online crime reporting media system Nibin N J by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: CSIS 2014-16 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

107.
Security protection over mozea Anjali Joy by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: CSIS 2014-16 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

108.
Construction of data stealing malware in andriod Nithya Sasi by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: CSIS 2015-17 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

109.
Malware detection using system call defendency graph Karthika Kurup B A by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: CSIS 2014-16 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

110.
Data recovery on FAT32 by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for reference: IIITM-K: Not for loan (1).

111.
Snorta (An IOC detection tool) by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for reference: IIITM-K: Not for loan (1).

112.
Fraudulent e-mail detection using bag of words and naive bayes by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for reference: IIITM-K: Not for loan (1).

113.
Automated tool for penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: CSIS 2015-17 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

114.
Automating payload generation in metasploit by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: CSIS 2015-17 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

115.
Automating the metasploit framework by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: CSIS 2015-17 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

116.
Android malware detection using classifier fusion method by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: MPHIL CS 2015-16 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

117.
Secured file sharing system-sync box by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: MSc IT 2014-16 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

118.
Violent python: A cookbook for hackers, forensic analysts, penetration testers and security engineers T. J. O'Connor by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London, Syngress, 2013
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (6)Call number: 005.133P OCO/V, ...

119.
Web security: A whitehat perspective by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, CRC Press, 2015
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 HAN/W.

120.
Handbook of cyber crimes by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Dominant, 2014
Availability: Items available for reference: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre: Not for loan (1)Call number: R 005.82 DAY/H.

Pages