Refine your search

Your search returned 40 results.

Sort
Results
1.
Managing business risks in the information age / Arthur Andersen by
Material type: Text Text; Literary form: Not fiction
Publication details: Hyderabad: University Press, 2000
Availability: Items available for loan: Indore (1)Call number: 658.4038 M2.

2.
Information systems security Fisher, Royal P. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Englewood Cliffs, N.J. Prentice-Hall 1984
Availability: Items available for loan: Ahmedabad (1)Call number: 658.4 F4I6.

3.
Computer data security Katzan, Harry by Series: Computer science series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York Van Nostrand Reinhold Company 1973
Availability: Items available for loan: Ahmedabad (1)Call number: 651.26 K2C6.

4.
Security for computer systems Farr, M. A. L. by Series: Computers and the professional charts in pocket
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Manchester National Computing Centre Ltd. (NCC) 1973, c9172
Availability: Items available for loan: Ahmedabad (1)Call number: 658.28 F2S3.

5.
Computer security management Parker, Donn B. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Reston Va. Reston, Publishing Company, Inc. 1981
Availability: Items available for loan: Ahmedabad (1)Call number: 658.28 P2C6.

6.
Security standards for data processing Wooldridge, Susan by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London Macmillan Pree Ltd. 1973
Availability: Items available for loan: Ahmedabad (1)Call number: 658.28 W6S3.

7.
Lectures on data security: modern cryptology in theory and practice by Series: Lecture Notes in Computer Science; 1561
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin Springer-Verlag 1999
Availability: Items available for loan: Ahmedabad (1)Call number: 651.26 L3.

8.
Corporate computer and network security Panko, Raymond R by
Publication details: New Delhi Pearson Education 2003
Availability: Items available for loan: Ahmedabad (1)Call number: 005.8 P2C6.

9.
Network security: private communication in a public world Kaufman, Charlie by
Edition: 2d ed.
Publication details: New Delhi Prentice-Hall of India 2003
Availability: Items available for loan: Ahmedabad (1)Call number: 005.8 K2N3/2003.

10.
Out of the inner circle: a hacker's guide to computer security Bill Landreth by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Bellevue, Wash. New York Microsoft Press Distributed in the U.S. and Canada by Simon and Schuster 1985
Availability: Items available for loan: Ahmedabad (1)Call number: 658.478 L2O8.

11.
Computer insecurity Adrian R.D. Norman by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London Chapman and Hall 1983
Availability: Items available for loan: Ahmedabad (1)Call number: 658.478 N6C6.

12.
Advances in computer security management - Vol.1 by Series: Heyden Advances Library in EDP Management
Material type: Text Text; Literary form: Not fiction
Publication details: Philadelphia Heyden 1980
Availability: Items available for loan: Ahmedabad (1)Call number: 658.478 A2.

13.
Audit and control of systems software by
Material type: Text Text; Literary form: Not fiction
Publication details: Manchester NCC Publications 1983
Availability: Items available for loan: Ahmedabad (1)Call number: 658.478 N2A8.

14.
Introducing computer security Michael B. Wood by
Material type: Text Text; Literary form: Not fiction
Publication details: Manchester NCC Publications 1982
Availability: Items available for loan: Ahmedabad (1)Call number: 658.478 W6I6.

15.
Systems design for data protection Michael Wood by
Material type: Text Text; Literary form: Not fiction
Publication details: Manchester NCC Publications 1984
Availability: Items available for loan: Ahmedabad (1)Call number: 658.478 W6S9.

16.
Nine steps to effective EDP loss control Tom S. Eason and Douglas A. Webb by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Bedford, Massachusetts Digital Press 1982
Availability: Items available for loan: Ahmedabad (1)Call number: 658.478 E2N4.

17.
Protecting your microcomputer system Harold Joseph Highland by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York Wiley 1984
Availability: Items available for loan: Ahmedabad (1)Call number: 658.478 H4P7.

18.
Understanding computer crime Lyons, Norman R. by Series: An Alfred Handy Guide
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Sherman Oaks Alfred Pub. Co. 1984
Availability: Items available for loan: Ahmedabad (1)Call number: 364.168 L9U6.

19.
Security architect careers in IT service management Jon Collins by Series: BCS guides to IT roles ;
Publication details: Swindon BCS 2014
Availability: Items available for loan: Lucknow (1).

20.
Corporate computer security / Randall J. Boyle (Longwood University), Raymond R. Panko (University of Hawaiʻi at Mānoa) by
Edition: Fourth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Pearson, [2015]
Availability: Items available for loan: Shillong (2).

Pages

Powered by Koha