Refine your search

Your search returned 929 results.

Sort
Results
141.
Network security: The complete reference by Roberta Bragg, Rhodes-Ousley, Strassberg Keith by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Tata McGraw-Hill, 2004
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 BRA/N.

142.
Network security: The complete reference by Roberta Bragg, Rhodes-Ousley, Strassberg Keith by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Tata McGraw-Hill, 2004
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 BRA/N;1.

143.
Handbook of applied cryptography by Alfred J Menezes, Paul C Van Oorschot, Scott A Vanstone by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, CRC Press, 1997
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 MEN/H.

144.
Elemetary cryptanalysis: A mathematical approach by Abraham Sinkov by Series: Mathematical Association of America ; 22
Edition: 2nd edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: USA, Mathematical Association of America, 2009
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 SIN/E.

145.
Introduction to cryptography: Principles and applications by Hans Delfs, Helmut Knebl by
Edition: 2nd edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Heidelberg, Springer, 2007
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 DEL/I.

146.
An introduction to cryptography by Richard A Mollin by Series: Discrete mathematics and its applications
Edition: 2nd edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, Taylor & Francis, 2007
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 MOL/I.

147.
An introduction to cryptography by Richard A Mollin by Series: Discrete mathematics and its applications
Edition: 2nd edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, Taylor & Francis, 2007
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 MOL/I;1.

148.
Operating system: Design and implementation by Andrew S Tanenbaum, Albert S Woodhull by
Edition: 3rd edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, PHI Learning, 2006
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.43 TAN/O;1.

149.
Security in computing by Charles P Pfleeger, Shari Lawrence Pfleeger by
Edition: 4th edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: USA, Pearson, 2009
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 PFL/S.

150.
Database and application security: Integrating information security and data management by Bhavani Thuraisingham by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, Auerbach Publications 2005
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 THU/D.

151.
Database and application security: Integrating information security and data management by Bhavani Thuraisingham by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, Auerbach Publications 2005
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 THU/D;1.

152.
Information warfare and security by Dorothy E Denning by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, Addison Wesley, 1999
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 DEN/I.

153.
Integrity, internal control and security in information systems: Connecting governance and technology edited by Michael Gertz by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: USA, Kluwer Academic Publishers, 2002
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (2)Call number: 005.82 GER/I, ...

154.
Computer security: Art and science by Matt Bishop by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: USA, Pearson, 2003
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 BIS/C.

155.
The digital rights movement: the role of technology in subverting digital copyright by Hector Postigo by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cambridge, The MIT Press, 2012
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 345.02662 POS/D.

156.
Embedded systems security: practical methods for safe and secure software and systems development / by David Kleidermacher, Mike Kleidermacher by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam, Elsevier, 2012
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 KLE/E.

157.
Biometric technologies and verification systems by John R. Vacca by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam, Elsevier, 2007
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 006.4 VAC/B.

158.
Security in computing and communications: International symposium, SSCC 2013 Mysore, India, August 2013 Proceedings edited by Sabu M Thampi et.al by Series: Communications in Computer and nformation Science ; 377
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London, Springer, 2013
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (2)Call number: 005.8 THA/S, ...

159.
Handbook of database security: Applications and trends edited by by Michael Gertz, Sushil Jajodia, by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: U.S.A, Springer, 2008
Availability: Items available for reference: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre: Not for loan (1)Call number: R 005.82 GER/H.

160.
Handbook of database security: Applications and trends edited by by Michael Gertz, Sushil Jajodia, by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: U.S.A, Springer, 2008
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 GER/H;1.

Pages