Your search returned 178 results.

Sort
Results
21.
Security modeling and analysis of mobile agent systems by Lu Ma and Jeffrey J.P. Tsai by
  • Ma, Lu
  • Tsai, Jeffrey J.P
Material type: Text Book
Publication details: London Imperial College Press 2006
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 621.38456028558 P06.

22.
Advances in Information Security Management & Small Systems Security by
  • Eloff, Jan H. P
Material type: Text Book
Publication details: Kluwer Academic Publishers 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 658.0558 P01.

23.
CCSA CP2000 by
  • Stovall, Les
Material type: Text Book
Publication details: Coriolis Group, LLC, The 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

24.
Check Point Next Generation Security Administration by
  • Amon, Cherie Simonis, Drew, Kligerman, Daniel
Material type: Text Book
Publication details: Syngress Publishing 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: QA76.9.A25.C454 2002beb.

25.
Check Point NG VPN-1/FireWall-1 Advanced Configuration and Troubleshooting by
  • Noble, Jim
  • Maxwell, Doug
  • Hourihan, Kyle X
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 .

26.
Computers at Risk Safe Computing in the Information Age by
  • National Research Council Staff
Material type: Text Book
Publication details: National Academies Press 1990
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

27.
Configuring ISA Server 2000 Building Firewalls for Windows 2000 by
  • Shinder, Thomas Grasdal, Martin, Shinder, Deb
Material type: Text Book
Publication details: Syngress Publishing 2000
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

28.
Configuring Symantec AntiVirus Corporate Edition by
  • Shimonski, Robert J. Kahn, Athar A, Hunter, Laura E
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

29.
Crackproof Your Software Protect Your Software Against Crackers by
  • Cerven, Pavol
Material type: Text Book
Publication details: No Starch Press 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

30.
CURRENT SECURITY MANAGEMENT & ETHICAL ISSUES OF INFORMATION TECHNOLOGY by
  • Azari, Rasool
Material type: Text Book
Publication details: Idea Group Inc. 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

31.
Cyber Adversary Characterization Auditing the Hacker Mind by
  • Parker, Tom Shaw, Eric, Sachs, Marcus H
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 .

32.
Data Privacy in the Information Age by
  • Klosek, Jacqueline
Material type: Text Book
Publication details: Greenwood Publishing Group, Incorporated 2000
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

33.
Disaster Proofing Information Systems by
  • Buchanan, Robert W
Material type: Text Book
Publication details: McGraw-Hill Professional Publishing 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8/6 .

34.
Dr. Tom Shinder's Configuring ISA Server 2004 by
  • Shinder, Thomas, Littlejohn, Shind
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.7/1376 .

35.
ExamInsight For CompTIA Security+ Certification (SY0-101) Second Edition by
  • Houser, Tcat, O'Boyle, Helen
Material type: Text Book
Publication details: TotalRecall Publications 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 4.6 .

36.
ExamWise For CompTIA Security+ Examination (SY0-101) by
  • Houser, Tcat, O'Boyle, Helen
Material type: Text Book
Publication details: TotalRecall Publications 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: .

37.
Executive's Guide to Privacy Management by
  • Erbschloe, Michael
Material type: Text Book
Publication details: McGraw-Hill Trade 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 658.4/78 .

38.
Finding and Fixing Vulnerabilities in Information Systems The Vulnerability Assessment and Mitigation Methodology by
  • Anton, Philip S. Mesic, Richard, Anderson, Robert H
Material type: Text Book
Publication details: Rand Corporation, The 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

39.
Hacking The Art of Exploitation by
  • Erickson, Jon
Material type: Text Book
Publication details: No Starch Press, Incorporated 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

40.
Hacking the Code ASP. NET Web Application Security by
  • Burnett, Mark
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 658.47 .

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2023. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832

Powered by Koha