" /> /cgi-bin/koha/unapi" /> /cgi-bin/koha/opac-search.pl?q=ccl=su%253A%2522Security%2520measures%2522&count=50&sort_by=acqdate_dsc&format=rss2" />

Your search returned 10 results. /cgi-bin/koha/opac-search.pl?q=ccl=su%253A%2522Security%2520measures%2522&count=50&sort_by=acqdate_dsc&format=rss2" class="rsssearchlink noprint">Subscribe to this search

|
1. Computer security Principles and Practices / by William Stallings

by Stallings, William | Brown, Lawrie.

Edition: 3rdMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston Pearson 2015Availability: Items available for loan: [Call number: 005.8 STA] (2).

2. Principles of information security / by Michael E Whitman

by Whitman, Michael E | Mattord, Herbert J.

Edition: 4thMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Cengage Learning 2012Availability: Items available for loan: [Call number: 005.8 WHI] (1).

3. Enterprise level security Securing Information Systems in an uncertain world / by William Randolph Simpson

by Simpson, William Randolph.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton CRC Press 2016Availability: Items available for loan: [Call number: 005.8 SIM] (1).

4. Cyber reconnaissance, surveillance, and defense / By Robert Shimonski

by Shimonski, Robert | Esq, John Zenir.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam Syngress 2015Availability: Items available for loan: [Call number: 327.12 SHI] (1).

5. Microsoft encyclopedia of security / by Mitch Tulloch

by Tulloch, Mitch.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Washington Microsoft Press 2003Availability: Items available for loan: [Call number: 005.803 TUL] (1).

6. Tap Unlocking the Mobile Economy / by Anindya Ghose

by Ghose, Anindya.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London The MIT Press 2017Availability: Items available for loan: [Call number: 381.142 GHO] (1).

7. Blockchain Blueprint for a New Economy / by Swan, Melanie

by Swan, Melanie.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Shroff Publishers 2015Availability: Items available for loan: [Call number: 332.178 SWA] (1).

8. Web application hacker's handbook : finding and exploiting security flaws Finding and Exploiting Security Flaws by / Stuttard, Dafdd

by Stuttard, Dafdd | Pinto, Marcus.

Edition: Stuttard, DafddMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Wiley 2011Availability: Items available for loan: [Call number: 23 STU] (1).

9. Securing the Cloud Cloud Computer Security Techniques and Tactics by / Winkler, Vic (J.R)

by Winkler, Vic (J.R) | Winkler, Vic (J.R).

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London Elsevier 2011Availability: Items available for loan: [Call number: 005.8 WIN] (1).

10. Security For Telecommunications Network Management by / Rozenblit, Moshe

by Rozenblit, Moshe | Rozenblit, Moshe.

Edition: 1stMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: America IEEE PRESS 2000Availability: Items available for loan: [Call number: 621.382 ROZ] (1).

Central Library, Indian Institute of Information Technology, Vadodara
Block No.9, Government Engineering College,
Sector-28, Gandhinagar, Gujarat - 382028 (India)
library@iiitvadodara.ac.in

Powered by Koha