Your search returned 206 results.

Sort
Results
181.
Modern cryptography, probabilistic proofs, and pseudorandomness Oded Goldreich by
  • Goldreich Oded
Series: Algorithms and combinatorics ; 17
Material type: Text Book
Publication details: New York Springer 1999
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 P (CSA).

182.
Modern cryptography probabilistic proofs and pseudo-randomness by by O Goldreich by
  • Goldreich, O
Material type: Text Book
Publication details: New York Springer 1999
Availability: Items available for loan: Computer Science and Automation (1)Call number: 511.6 N99;1 (CSA).

183.
Protection of information in computer systems by David D Clark and David D Redell by
  • Clark, David D
  • Redell, David D
Material type: Text Book
Publication details: Washington IEEE 1975
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 658.478 N75.

184.
Analyzing computer security by Charles P Pfleeger and Shari Lawrence Pflleeger by
  • Pfleeger, Charles P
  • Peleeger, Shari Lawrence
Material type: Text Book
Publication details: New Delhi Pearson 2014
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P141 (CSA).

185.
Cryptanalysis of RSA and its variants by M Jason Hinek by
  • Hinek, M Jason
Material type: Text Book
Publication details: Boca Raton CRC Press 2010
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 P102 (CSA).

186.
Cloud Security: A Comprehensive Guide to Secure Cloud Computing by Ronald L Krutz and Russell Dean Vines by
  • Krutz, Ronald L
  • Vines, Russell Dean
Material type: Text Book
Publication details: New Delhi Wiley 2010
Availability: Items available for loan: Electrical Engineering (1)Call number: 005.8 P101 (EE).

187.
Information Integrity: Issues and approaches - proceedings/Jawaharlal Nehru Centre for Advanced Scientific Research and Supercomputer Education and Research Centre Indian Institute of Science Campus, Discussion Meeting Bangalore 560 012, India, 22-23 June 1995 ed by V Rajaraman and Vijay V Mandke by
  • Rajaraman, V., ed
  • Mandke, Vijay V., ed
Material type: Text Book
Publication details: New Delhi Information Integrity Foundation 1996
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 N96.

188.
Art of memory forensics: detecting malware and threats in windows linux and mac memory by Michael Hale Ligh., et al by
  • Ligh, Michael Hale
Material type: Text Book
Publication details: New Dehli Wiley India 2016
Availability: Items available for loan: Computer Science and Automation (1)Call number: 004.5028558 P14 (CSA).

189.
Cryptography and network security: Principles and practice by William Stallings by
  • Stallings, William
Edition: 7th ed
Material type: Text Book
Publication details: Noida Pearson 2017
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 P17 (CSA).

190.
Applied cryptography: Protocols, algorithms, and source code in C by Bruice Schneier by
  • Schneier, Bruice,
Edition: 2nd ed.
Material type: Text Book
Publication details: New Delhi Wiley 2006
Availability: Items available for loan: Electronic Systems Engineering (1)Call number: 005.82 P065 (ESE).

191.
Cryptography and network security principles and practice by Wiiliam Stallings by
  • Stallings, Wiiliam,
Edition: 6th ed
Material type: Text Book
Publication details: Noida Dorling Kindersely (India) Pvt. ltd. 2014
Availability: Items available for loan: Electronic Systems Engineering (1)Call number: 005.8 P142 (ESE).

192.
Virtualization and forensics : a digital forensic investigator's guide to virtual environments by Diane Barrett, Gregory Kipper by
  • Barrett, Diane,
  • Gregory Kipper
Material type: Text Book
Publication details: Amsterdam Syngress ​Elsevier 2010
Availability: Items available for loan: Supercomputer Education and Research Centre (1)Call number: 363.25028568 BAR/V.

193.
Introduction to modern cryptography by Jonathan Katz, Yehuda Lindell by
  • Katz, Jonathan,
Series: Chapman & Hall/CRC cryptography and network security ; Chapman & Hall/CRC Cryptography and Network Security Series
Edition: 2nd ed.
Material type: Text Book
Publication details: Boca Raton CRC press 2015
Availability: Items available for loan: Electrical Communication Engineering (1)Call number: 005.82 KAT/I.

194.
Efficient secure two-party protocols techniques and constructions by Carmit Hazay and Yehuda Lindell by
  • Hazay, Carmit,
Series: Information security and cryptography texts and monographs ;
Material type: Text Book
Publication details: Verlag Berlin Heidelberg Springer 2010
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 HAZ/E.

195.
Introduction to modern cryptography by Katz Jonathan and Yehuda Lindell by
  • Katz, Jonathan,
  • Lindell, Yehuda
Series: Chapman Hall, CRC cryptography and network security ;
Edition: 3nd ed.
Material type: Text Book
Publication details: Boca Rotan CRC Press 2021
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 JON/I.

196.
Introduction to modern cryptography by
  • Katz, Jonathan,
  • Lindell, Yehuda
Series: Chapman Hall, CRC cryptography and network security ;
Edition: 3rd ed.
Material type: Text Book
Publication details: Boca Raton CRC Press 2021
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 KAT/I.

197.
Secure multiparty computation and secret sharing by Ronald Cramer, Ivan Bjerre Damgard, and Jesper Buus Nielsen. by
  • Cramer, Ronald,
  • Damgard, Ivan Bjerre
  • Neilsen, Jesper Buus
Material type: Text Book
Publication details: Cambridge Cambridge University Press 2015
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 CRA.

198.
Rootkits and bootkits reversing modern malware and next generation threats by Alex Matrosov, Eugene Rodionov and Sergey Bratus by
  • Matrosov, Alex,
  • Bratus, Sergey
  • Rodionov, Eugene
Material type: Text Book
Publication details: San Francisco No Starch Press 2019
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 MAT.

199.
Proactive botnet detection through characterization of distributed denial of service attacks by Thomas Hyslip by
  • Hyslip, Thomas,
Material type: Text Book
Publication details: CreateSpace Independent Publishing Platform 2015
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 HYS.

200.
Cyber security handbook cyber domain is unforgiving be prepared by S. Khadsare by
  • Khadsare, S,
Material type: Text Book
Publication details: Seattle Digital Publication India 2017
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 KHA.

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2023. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832

Powered by Koha