Refine your search

Your search returned 53 results.

Sort
Results
1.
Financial cryptography / rafael Hirschfeld by
Material type: Text Text; Literary form: Not fiction
Publication details: Berlin: Springer, 1998
Availability: Items available for loan: Indore (1)Call number: 005.84 F4H4.

2.
Protect your privacy on the internet (Includes CD-ROM) / Bryan Pfaffenberger by
Material type: Text Text; Literary form: Not fiction
Publication details: New York: Prentice Hall of India, 1997
Availability: Items available for loan: Indore (1)Call number: 005.8 P7P3.

3.
Impacts and risk assessment of technology for Internet security : enabled information small-medium enterprises (TEISMES) / by Charles A Shoniregun by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer, 2005
Availability: Items available for loan: Indore (1)Call number: 005.8 S4I5.

4.
Internet security : how to defend against attackers on the web / Mike Harwood by
Edition: 2nd ed.
Material type: Text Text; Format: print
Publication details: Burlington: Jones & Bartlett Learning, 2015
Availability: Items available for loan: Indore (1)Call number: 302.30285 H2I6.

5.
Hack proofing your e-commerce site by Series:
Edition:
Material type: Text Text
Publication details: Rockland Syngress 2001
Availability: Items available for loan: Kozhikode (1)Call number: 681.3.02 RUS.

6.
Securing the information infrastructure by Series:
Edition:
Material type: Text Text
Publication details: Hershey Cybertech 2008
Availability: Items available for loan: Kozhikode (1)Call number: 681.3.004.4 KIZ.

7.
Web security A whitehat perspective by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York CRC Press 2015
Availability: Items available for loan: Kozhikode (1)Call number: 681.324.004.4 WU/W.

8.
Cyber security.Simply.Make it happen.: Leverging digitization through IT security by Series: Management for professionals
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Switzerland: Springer; 2017
Availability: Items available for loan: Kozhikode (1)Call number: 681.324.004 ABO/C.

9.
Net privacy: a guide to developing and implementing an ironclad ebusiness privacy plan Erbschloe, Michael by
Publication details: New York McGraw-Hill 2001
Availability: Items available for loan: Ahmedabad (1)Call number: 004.6 E7N3.

10.
Hacked, attacked and abused: digital crime exposed Lilley, Peter by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London Kogan Page 2002
Availability: Items available for loan: Ahmedabad (1)Call number: 364.168 L4H2.

11.
Internet security: a jumpstart for systems administrators and IT managers Speed, Tim. by
Publication details: New Delhi Elsevier Science 2003
Availability: Items available for loan: Ahmedabad (1)Call number: 005.8 S7I6.

12.
Securing web services: practical usage of standards and specifications by
Publication details: Hershey Information Science Reference 2008
Availability: Items available for loan: Ahmedabad (1)Call number: 005.8 P3S3.

13.
Future of the internet and how to stop it by
Publication details: London Penguin Group 2008
Availability: Items available for loan: Ahmedabad (1)Call number: 004.6780112 Z4F8.

14.
Practical internet security by
Publication details: New York Springer Science+Business Media 2007
Availability: Items available for loan: Ahmedabad (1)Call number: 005.8 V2P7.

15.
Wireless Internet security: architecture and protocols Kempf, James by
Publication details: Cambridge Cambridge University Press 2008
Availability: Items available for loan: Ahmedabad (1)Call number: 005.8 K3W4.

16.
How personal and Internet security work Gralla, Preston by
Publication details: Noida Dorling Kindersley/Pearson Education 2012
Availability: Items available for loan: Ahmedabad (1)Call number: 005.8 G7H6.

17.
18.
Cryptography and network security principles and practice by
Edition: 2nd ed.
Publication details: New Jersey Printice Hall 2000
Availability: Items available for loan: Lucknow (1).

19.
Information warfare and security by
Publication details: Reading Addison-Wesley 1999
Availability: Items available for loan: Lucknow (1).

20.
The Hundredth Window protecting your privacy and security in athe age of the Internet Charles Jennings Lori Fena by
Publication details: New York Free Press 2000
Availability: Items available for loan: Lucknow (1).

Pages

Powered by Koha