Your search returned 178 results.

Sort
Results
101.
Sockets, Shellcode, Porting, and Coding Reverse Engineering Exploits and Tool Coding for Security Professionals by
  • Foster, James C
Material type: Text Book
Publication details: Syngress Publishing 2005
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: .

102.
SSCP Study Guide & DVD Training System by
  • Jacobs, Josh Dalton, Michael, Clemmer, Lee
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: .

103.
Technology and Privacy The New Landscape by
  • Rotenberg, Marc, Agre, Philip E
Material type: Text Book
Publication details: MIT Press 1997
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 323.44/83 .

104.
Trusted Information The New Decade Challenge by
  • Dupuy, Michel, Paradinas, Pierre
Material type: Text Book
Publication details: Kluwer Academic Publishers 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

105.
Ethereal Packet Sniffing by
  • Orebaugh, Angela Warnicke, Ed, Morris, Greg
Material type: Text Book
Publication details: Syngress Publishing
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 4.6 .

106.
Best Damn Firewall Book Period by
  • Shinder, Thomas W. Shimonski, Robert J, Amon, Cherie
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.82 .

107.
Check PointT Next Generation with Application Intelligence Security Administration by
  • Contributors Kligerman, Daniel Tobkin, Chris
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.82 .

108.
Code Hacking A Developer's Guide to Network Security by
  • Conway, Richard, Cordingley, Julian
Material type: Text Book
Publication details: Charles River Media 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

109.
Configuring NetScreen Firewalls by
  • Cameron, Rob
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.82 .

110.
Google Hacking for Penetration Testers by
  • Long, Johnny
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.713 .

111.
Hack Proofing Linux A Guide to Open Source Security by
  • Stanger, James Danielyan, Edgar, Lane, Patrick
Material type: Text Book
Publication details: Syngress Publishing 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.446 .

112.
Hack Proofing Your Web Application Only Way to Stop a Hacker is to Think by
  • Traxler, Julie, Forristal, Jeff
Material type: Text Book
Publication details: Syngress Publishing 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

113.
Hacker's Challenge by
  • Schiffman, Mike
Material type: Text Book
Publication details: McGraw-Hill Professional 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 4.6 .

114.
IIS Security by
  • Jost, Marty
Material type: Text Book
Publication details: McGraw-Hill Professional 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

115.
Internet Security and Firewalls by
  • Preetham, V
Material type: Text Book
Publication details: Course Technology 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

116.
Network Security A Beginner's Guide by
  • Maiwald, Eric
Material type: Text Book
Publication details: McGraw-Hill Professional 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

117.
Network Security Illustrated by
  • Sonnenreich, Wes, Albanese, Jason
Material type: Text Book
Publication details: McGraw-Hill Professional Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

118.
Cryptography and network security principles and practices by William Stallings by
  • Stallings, William
Edition: 3rd ed.
Material type: Text Book
Publication details: New Delhi Pearson Education 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 P032.

119.
Advances in Information and Computer Security ed by Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, by
  • Yoshiura, Hiroshi, ed
  • Sakurai, Kouichi, ed
  • Kai, Rannenberg, ed
Material type: Text Book
Publication details: Berlin Springer
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 .

120.
Digital watermarking and steganography Fundamentals and techniques by Frank Y Shih by
  • Shih, Frank Y
Material type: Text Book
Publication details: New York CRC 2008
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 P08.

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2023. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832

Powered by Koha