" /> /cgi-bin/koha/unapi" /> /cgi-bin/koha/opac-search.pl?q=ccl=su%253A%2522Computer%2520security%2522&count=50&sort_by=acqdate_dsc&format=rss2" />

Your search returned 17 results. /cgi-bin/koha/opac-search.pl?q=ccl=su%253A%2522Computer%2520security%2522&count=50&sort_by=acqdate_dsc&format=rss2" class="rsssearchlink noprint">Subscribe to this search

|
1. E-Mail hacking Learn e-mail hacking the easy way / by Ankit Fadia

by Fadia, Ankit.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida Vikas publishing house ptv ltd 2014Availability: Items available for loan: [Call number: 005.8 FAD] (1).

2. How to unblock everything on the internet / by Ankit Fadia

by Fadia, Ankit.

Edition: 2ndMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida Vikas publishing house ptv ltd 2014Availability: Items available for loan: [Call number: 004.65 FAD] (1).

3. Computer security Principles and Practices / by William Stallings

by Stallings, William | Brown, Lawrie.

Edition: 3rdMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston Pearson 2015Availability: Items available for loan: [Call number: 005.8 STA] (2).

4. Cryptography and network security Principles and Practices / by William Stallings

by Stallings, William.

Edition: 6thMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida Pearson Education 2015Availability: Items available for loan: [Call number: 005.8 STA] (7).

5. Cryptography an introduction / by Nigel P Smart

by Smart, Nigel P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London McGraw-Hill 2003Availability: Items available for loan: [Call number: 005.82 SMA] (1).

6. Introduction to modern cryptography / by Jonathan Katz

by Katz, Jonathan | Lindell, Yehuda.

Edition: 2ndMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton CRC Press 2015Availability: Items available for loan: [Call number: 005.82 KAT] (2).

7. Principles of information security / by Michael E Whitman

by Whitman, Michael E | Mattord, Herbert J.

Edition: 4thMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Cengage Learning 2012Availability: Items available for loan: [Call number: 005.8 WHI] (1).

8. Computer security / by Dieter Gollmann

by Gollmann, Dieter.

Edition: 3rdMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Wiley India 2011Availability: Items available for loan: [Call number: 005.8 GOL] (1).

9. Decrypted secrets Methods and maxims of cryptology / by Friedrich L. Bauer

by Bauer, Friedrich L.

Edition: 3rdMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: New York Springer 2007Availability: Items available for loan: [Call number: 005.82 BAU] (1).

10. Microsoft encyclopedia of security / by Mitch Tulloch

by Tulloch, Mitch.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Washington Microsoft Press 2003Availability: Items available for loan: [Call number: 005.803 TUL] (1).

11. Basics of hacking and penetration testing Ethical hacking and penetration testing made easy / By Patrick Engebretson

by Engebretson, Patrick | Kennedy, David.

Edition: 2ndMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A Syngress 2011Availability: Items available for loan: [Call number: 005.8 ENG] (1).

12. OS X exploits and defense / By Kevin Finisterre

by Finisterre, Kevin | H, Larry | Harley, David | Baccas, Paul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A Syngress 2008Availability: Items available for loan: [Call number: 005.8 FIN] (1).

13. Cryptography engineering Design principles and practical applications / by Niels Ferguson

by Ferguson, Niels | Schneier, Bruce | Kohno, Tadayoshi.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana Wiley Publishing, Inc. 2010Availability: Items available for loan: [Call number: 005.82 FER] (1).

14. Security Engineering A Guide to Building Dependable Distributed Systems by / Anderson, Ross

by Anderson, Ross.

Edition: 2ndMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Wiley 2008Availability: Items available for loan: [Call number: 005.1 AND] (1).

15. Web application hacker's handbook : finding and exploiting security flaws Finding and Exploiting Security Flaws by / Stuttard, Dafdd

by Stuttard, Dafdd | Pinto, Marcus.

Edition: Stuttard, DafddMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Wiley 2011Availability: Items available for loan: [Call number: 23 STU] (1).

16. Cryptography And Network Security by / Forouzan, Behrouz A

by Forouzan, Behrouz A | Mukhopadhyay, Debdeep.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi McGraw Hill Education (India) pvt. Ltd. 2016Availability: Items available for loan: [Call number: 005.8 STA] (1).

17. Securing the Cloud Cloud Computer Security Techniques and Tactics by / Winkler, Vic (J.R)

by Winkler, Vic (J.R) | Winkler, Vic (J.R).

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London Elsevier 2011Availability: Items available for loan: [Call number: 005.8 WIN] (1).

Central Library, Indian Institute of Information Technology, Vadodara
Block No.9, Government Engineering College,
Sector-28, Gandhinagar, Gujarat - 382028 (India)
library@iiitvadodara.ac.in

Powered by Koha