Refine your search
Availability
-
Authors
- Delfs, Hans
- Fan, Chun I
- Gollmann, Dieter
- Jajodia, Sushil
- Kumar, Ravinder
- Lockhart, Thurmon
- Marmol, Felix Gomez
- Perez, Gregorio Mart...
- Pfleeger, Charles P
- Pfleeger, Shari Lawr...
- Prowse, David L
- Shah, Deven N
- Smith, Richard E
- Stallings, William
- Stinson, Douglas R
- Thampi, Sabu M et.al
- Thomas, Tony
- Vijayaraghavan, Athi...
- Viza Shesha Shayana ...
- Xiao, Yang
- Show more
- Show less
-
Collections
- Artificial Intelligence/ Computational Intelligence / Cognitive Computing
- Blockchain/ Cryptocurrencies
- Cloud Computing
- Computer Network / Data Communication
- Cryptography/ Cyber Security
- Cyber Forensics/ Digital Forensics
- Data Analytics/ Big Data/ Data Mining
- Embedded Systems
- Fiction
- General
- IPR (Intellectual Property Rights)
- Machine Learning/ Deep Learning
- Mathematics
- Non Fiction
- Operating System
- Pattern Recognition/ Biometrics
- Programming in JAVA
- Programming Windows
- TCP/ IP /Internet of Things / IOT
- Show more
- Show less
-
Holding libraries
-
Item types
-
Locations
-
Series
- Addison-Wesley profe...
- Advances in Digital ...
- Advances in informat...
- Communcations in Com...
- Communications in Co...
- Communications in co...
- Computational Mathem...
- Computer Communicati...
- Discrete mathematics...
- Internal audit and I...
- Internet of everythi...
- Lecture notes in com...
- Mathematical Associa...
- Prentice Hall PTR Se...
- Springer Lecture not...
- springer series in a...
- Springer Series in C...
- Springer Series in S...
- Undergraduate texts ...
- Wiley series in soft...
- Show more
- Show less
-
Places
-
Topics
- ANDROID
- COMPUTER NETWORKS
- COMPUTER SCIENCE
- COMPUTER SECURITY
- CRYPTOGRAPHY
- CYBER CRIME
- CYBER SECURITY
- Cyber Security
- DATA PROTECTION
- DATA SECURITY
- ETHICAL HACKING
- HACKING
- INFORMATION SECURITY
- INFORMATION SYSTEMS
- MACHINE LEARNING
- NETWORK SECURITY
- SECURITY AND PRIVACY
- SYSTEM SECURITY
- WEB SECURITY
- WIRELESS SECURITY
- Show more
- Show less