Refine your search

Your search returned 1004 results.

Sort
Results
181.
Improving fuzzing and failure analysis on Mobile platforms by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT "Institute for Infocomm Research(I2R)"
Availability: Items available for reference: IIITM-K: Not for loan (2).

182.
Internet of things: A hands-on approach by Arshdeep Bahga, Vijay Madisetti by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hyderabad, Universities Press, 2015
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 004.62 BAH/I.

183.
Problem solving for wireless sensor networks Ana-Belén García-Hernando et. al. by Series: Computer communications and networks
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Springer (India) Pvt Ltd, 2011
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 621.3821 GAR/P.

184.
Build your own security lab: A field guide for network testing Michael Gregg by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Wiley India Pvt Ltd, 2012
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 GRE/B.

185.
Computer security and cryptography Kadema Carter (Ed) by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, Arcler Press, 2015
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 CAR/C.

186.
Social media mining: An introduction Reza Zafarani by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Cambridge University Press, 2015
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 006.312 ZAF/S.

187.
Security patterns in practice: Designing secure architectures using software patterns Eduardo B Fernandez by Series: Wiley series in software design patterns
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: UK, Wiley, 2013
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 FER/S.

188.
Object tracking and detection using extreme learning machine. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: MPhil Computer Science 2015-16 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

189.
Bluetooth honeypot by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Msc CSIS 2014-16 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

190.
Attack visualzation by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: MscCSIS 2014-16 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

191.
Cyber security and cyber war: What everyone needs to know P. W. Singer and Allan Friedman by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Noida, Oxford University Press, 2014
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (3)Call number: 005.82 SIN/C, ...

192.
Network security Terry D. Pardoe and gordon F. Snyder by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, Cengage Learning India, 2005
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 PAR/N.

193.
The shellcoder's handbook: Discovering and expoliting security holes Chris Anley, John Heasman, Felix "FX" Lindner, Gerardo Richarte by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Wiley Publishing, 2007
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 ANL/S.

194.
Visualization of raw data packets using R to detect network attacks by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for reference: IIITM-K: Not for loan (1).

195.
Controller placement problem in software defined networks Mahavir Oraon by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: CS INT
Availability: Items available for reference: IIITM-K: Not for loan (2).

196.
Vulnerability scanner by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for reference: IIITM-K: Not for loan (1).

197.
E mail fraud detection-feature extraction based on phrase frequency by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for reference: IIITM-K: Not for loan (1).

198.
E mail fraud detection-feature extraction based on word frequency by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for reference: IIITM-K: Not for loan (1).

199.
Online course on email security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for reference: IIITM-K: Not for loan (1).

200.
E learning course for password security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for reference: IIITM-K: Not for loan (1).

Pages