Refine your search

Your search returned 929 results.

Sort
Results
1.
Applied cryptography: Protocols, algorithms, and source code in C by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York Wiley 1996
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 SCH/A.

2.
Building internet firewalls by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai O'Reilly/Shroff Publishers and Distributors 2000
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.81 ZWI/B.

3.
Practical Unix and internet security by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai Oreilly/Shroff Publishers and Distributors 1999
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 GAR/P.

4.
Firewalls :A complete guide by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Tata Mc Graw Hill 2000
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.81 GON/F.

5.
RSA security's official guide to cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Tata Mc Graw Hill 2001
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 BUR/R.

6.
CISCO network security little black book by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Dreamtech 2003
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 JOE/C.

7.
Linux system security: An administrator's guide to open source security tools by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Pearson Education 2003
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.432L MAN/L.

8.
Hack attacks revealed: A complete reference for UNIX, Windows, and Linux with custom security toolkit by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Wiley 2002
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 CHI/H.

9.
Network security for Windows, UNIX, and Linux networks: Hack attacks denied by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Wiley 2002
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 CHI/N.

10.
Cryptography for database and internet applications: Developing secret and public key techniques with Java by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Wiley 2002
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 GAL/C.

11.
Java2:Network security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Addison Wesley Longman 2001
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.133J2 PIS/J.

12.
Cryptography and network security principles and practices by
Edition: 3
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi PHI Learning 2004
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 STA/C.

13.
Computer security art and science by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Pearson Education 2003
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 BIS/C.

14.
Cryptography in C and C++ by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Springer 2003
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 WEL/C.

15.
Web privacy with P3P by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai Oreilly/Shroff Publishers and Distributors 2002
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 CRA/W.

16.
Security in computing by
Edition: 3
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Pearson Education 2004
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 PFL/S.

17.
Email, spam and viruses : Degunking your email, spam and viruses by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Paraglyph Press 2005
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.84 DUN/E.

18.
Information warfare: how to survive cyber ttacks by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Tata McGraw Hill 2001
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 ERB/I.

19.
Gray hat hacking: The ethical hacker's handbook by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Tata McGraw Hill 2005
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 HAR/G.

20.
Digital security: Concepts and cases by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hyderabad ICFAI University Press 2004
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 GUP/D.

Pages