Refine your search

Your search returned 212 results.

Sort
Results
121.
Advanced computer network and security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Dominant, 2014
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 GAU/A.

122.
Security in computing by
Edition: 5
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Pearson Education, 2015
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 PFL/S.

123.
Certified ethical hacker version 9(CEH v9): Study guide by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indiana, John Wiley and Sons, 2016
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 ORI/C;1.

124.
Threat modeling: Designing for security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Canada, John Wiley & sons, 2014
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 SHO/T.

125.
Network security and cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Cengage Learning, 2011
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 MEN/N; 2.

126.
Principles of information security by
Edition: 5
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Cengage Learning, 2015
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 WHI/P.

127.
Mastering linux security and hardening: Secure your linux server and protect it from intruders, malware attacks and other external threats Donald A. Tevault by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai, Packt Publishing, 2018
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.432L TEV/M.

128.
Cryptography and network security: Principles and practice by
Edition: 5
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Pearson, 2013
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 STA/C.

129.
Android security: Attacks and defenses Abhishek Dubey by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, CRC Press, 2013
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.432A DUB/A.

130.
Android security: Attacks and defenses Abhishek Dubey by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, CRC Press, 2013
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.432A DUB/A;1.

131.
Cryptography and network security: Principles and practice William Stallings by
Edition: 7
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Pearson, 2017
Availability: Items available for reference: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre: Not for loan (1)Call number: R 005.82 STA/C;1.

132.
Learning malware analysis: Explore the concepts, tools and techniques to analyze and investigate windows malware Monnappa K A by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai, Packt Publishing, 2018
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 MON/L.

133.
Cybersecurity: Essentials Charles J Brooks by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, John Wiley & Sons, 2018
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 BRO/C.

134.
Security without obscurity: A guide to cryptographic architectures J J Stapleton by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, CRC Press, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 STA/S.

135.
Machine learning and security: Protecting systems with data and algorithms Clarence Chio by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Sebastopol, O'Reilly, 2018
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 006.31 CHI/M.

136.
Cyber security Avantika Ydav by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Narosa Publishing House, 2017
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 YAD/C.

137.
Cybercrime: The psychology of online offenders Grainne Kirwan by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, Cambridge University Press, 2013
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 KIR/C.

138.
Beginning ethical hacking with python Sanjib Sinha by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: USA, Apress, 2017
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 SIN/B.

139.
Gray hat hacking: The ethical hacker's handbook Allen Harper by
Edition: 5
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, McGraw-Hill Education, 2018
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 HAR/G.

140.
Network anomaly detection: A machine learning perspective Dhruba Kumar Bhattacharyya by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, CRC Press, 2014
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 BHA/N.

Pages