Your search returned 92 results.

Sort
Results
1.
Privacy protection for e-services by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Idea Group 2006
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 YEE/P.

2.
Security and privacy : Silver linings in the cloud by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Germany Springer 2010
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 006.8 RAN/S.

3.
Anonymity-engine by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: MSc. Computer Science and Information Security 2013 - 2015 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

4.
SAP implementation by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Information Technology 2013-2015 EXT "RampGreen Solution Pvt. Ltd"
Availability: Items available for reference: IIITM-K: Not for loan (1).

5.
Ensuring dialog mechanism in mydeals247 android application by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Information Technology 2013-2015 EXT "MyDeals247 Pvt. Ltd."
Availability: Items available for reference: IIITM-K: Not for loan (2).

6.
Two factor authentication by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT "Mirox Cyber Security and Technologies Pvt. Ltd"
Availability: Items available for reference: IIITM-K: Not for loan (1).

7.
Vulnerability assessment and penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT "Denave India Pvt. Ltd."
Availability: Items available for reference: IIITM-K: Not for loan (1).

8.
Split master: secure file sharing application based on shamir secret sharing scheme by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT "Kottackal Business Solutions Pvt Ltd."
Availability: Items available for reference: IIITM-K: Not for loan (1).

9.
Bigdata security using apache knox by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

10.
Comprehensive study on web application security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT "Coffye Innovations Pvt Ltd."
Availability: Items available for reference: IIITM-K: Not for loan (1).

11.
Network analyzer - a method for detecting advanced persistent threat by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT " IIT, Madras "
Availability: Items available for reference: IIITM-K: Not for loan (1).

12.
Security layer implementation on a web application by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT "Thoughts Arena Solutions Pvt. Ltd."
Availability: Items available for reference: IIITM-K: Not for loan (1).

13.
Secvizer: a network security visualization tool by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 INT
Availability: Items available for reference: IIITM-K: Not for loan (1).

14.
Vulnerability assessment and penetration testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT "EY LLP, Trivandrum"
Availability: Items available for reference: IIITM-K: Not for loan (2).

15.
Advanced persistent threat monitoring system by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT "Mirox Cyber Security and Pvt Ltd"
Availability: Items available for reference: IIITM-K: Not for loan (1).

16.
Password sniffing on campus lan by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT "Indian Institute of Technology, Madras"
Availability: Items available for reference: IIITM-K: Not for loan (1).

17.
Secure monitoring in flexible network by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT "Reflection Technologies, Trivandrum"
Availability: Items available for reference: IIITM-K: Not for loan (1).

18.
Application and Infrastructure security assessments by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT "Ernst & Young LLP, Trivandrum"
Availability: Items available for reference: IIITM-K: Not for loan (1).

19.
VAPT : Vulnerability assessment and penetration testing of mydeals247 website by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT "MyDeals247 Eccommerce Pvt Ltd."
Availability: Items available for reference: IIITM-K: Not for loan (1).

20.
Improving fuzzing and failure analysis on Mobile platforms by
Material type: Text Text; Format: print ; Literary form: Not fiction
Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT "Institute for Infocomm Research(I2R)"
Availability: Items available for reference: IIITM-K: Not for loan (2).

Pages