Refine your search

Your search returned 271 results.

Sort
Results
1.
Building SET applications for secure transactions / Mark S. Merkow, Jim Breithaupt, Ken L. Wheeler. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Wiley, c1998
Online resources:
Availability: Items available for loan: Lucknow (1)Call number: 658.403J1 MER.

2.
Financial cryptography / rafael Hirschfeld by
Material type: Text Text; Literary form: Not fiction
Publication details: Berlin: Springer, 1998
Availability: Items available for loan: Indore (1)Call number: 005.84 F4H4.

3.
Security protocols / Bruce Christianson, Bruno Crispo, and William S Harbison by
Material type: Text Text; Literary form: Not fiction
Publication details: Berlin: Springer, 1998
Availability: Items available for loan: Indore (1)Call number: 005.8 S3H2.

4.
Secure networking - CQRE [Secure] '99 / Rainer Baumgart by
Material type: Text Text; Literary form: Not fiction
Publication details: Berlin: Springer, 1999
Availability: Items available for loan: Indore (1)Call number: 004.6 S3B2.

5.
Electronic commerce: security, risk management and control / Marilyn Greenstein and Todd M. Feinman by
Material type: Text Text; Literary form: Not fiction
Publication details: New Delhi: Tata McGraw Hill, 2000
Availability: Items available for loan: Indore (1)Call number: 658.0546 E5G7.

6.
Security and privacy for e-business / Anup K. Ghosh by
Material type: Text Text; Literary form: Not fiction
Publication details: New York : John Wiley, 2001
Availability: Items available for loan: Indore (1)Call number: 005.8 S3G4.

7.
Handbook of information security / edited by Hossein Bidgoli. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, NJ : Wiley, 2005
Availability: Items available for loan: Indore (3)Call number: 005.8 B4H2(R), ...

8.
Web and information security / Elena Ferrari, Bhavani Thuraisingham, [editors]. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey, PA : IRM Press, c2006
Availability: Items available for loan: Indore (1)Call number: 005.8 F3W3.

9.
Enterprise information systems assurance and system security : managerial and technical issues / [edited by] Merrill Warkentin and Rayford Vaughn. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey : Idea Group Pub., c2006
Availability: Items available for loan: Indore (1)Call number: 005.8 W2E6.

10.
Impacts and risk assessment of technology for Internet security : enabled information small-medium enterprises (TEISMES) / by Charles A Shoniregun by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer, 2005
Availability: Items available for loan: Indore (1)Call number: 005.8 S4I5.

11.
Digital privacy: theory, technologies, and practices / edited by Alessandro Acquisti ... [et al.] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Auerbach Publications, c2008
Availability: Items available for loan: Indore (1)Call number: 005.8 A2D4.

12.
International IT governance : an executive guide to ISO 17799/ISO 27001 / Alan Calder & Steve Watkins by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London ; Philadelphia, PA: Kogan page Limited, 2006
Availability: Items available for loan: Indore (1)Call number: 005.8 C2I6.

13.
IT governance: an international guide to data security and ISO 27001/ISO 27002 / Alan Calder and Steve Watkins by
Edition: 6th ed.
Material type: Text Text; Format: print
Publication details: New DelhiL: Kogan Page, 2015
Availability: Items available for loan: Indore (1)Call number: 005.8 C2I8.

14.
Security policies and impelmetation issues / Rob Johnson by
Edition: 2nd ed.
Material type: Text Text; Format: print
Publication details: Burlington: Jones & Bartlett Learning, 2014
Availability: Items available for loan: Indore (1)Call number: 005.8 J6S3 .

15.
Hacker techniques tools and incident handling / Sean- Philip Oriyano by
Edition: 2nd ed.
Material type: Text Text; Format: print
Publication details: Burlington: Jones & Bartlett Learning, 2013
Availability: Items available for loan: Indore (1)Call number: 621.38 O7H2.

16.
CISSP: certified information systems security professional study guide / James Michael Stewart, Mike Chapple and Darril Gibson by
Material type: Text Text; Format: print
Publication details: New Delhi: Wiley, 2015
Availability: Items available for loan: Indore (1)Call number: 005.8 S8C4.

17.
The hacker playbook 3: practical guide to penetration testing / Peter Kim by
Material type: Text Text; Format: print
Publication details: [s.l]: Independently Published, 2018
Availability: Items available for loan: Indore (1)Call number: 005.8 K4H2.

18.
Control and security of E-commerce by Series:
Edition:
Material type: Text Text
Publication details: New Jersey John Wiley & sons 2004
Availability: Items available for loan: Kozhikode (1)Call number: 681.324:658 SMI.

19.
Handbook of information security Vol. 2 by Series:
Edition:
Material type: Text Text
Publication details: Wiley 2006
Availability: Not available: Kozhikode: Withdrawn (1).

20.
Handbook of information security Vol. 3 by Series:
Edition:
Material type: Text Text
Publication details: Wiley 2006
Availability: Items available for loan: Kozhikode (1)Call number: 681.324(100)(031) BI.

Pages

Powered by Koha