Your search returned 140 results.

Sort
Results
81.
Finding and Fixing Vulnerabilities in Information Systems The Vulnerability Assessment and Mitigation Methodology by
  • Anton, Philip S. Mesic, Richard, Anderson, Robert H
Material type: Text Book
Publication details: Rand Corporation, The 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

82.
Hack Proofing Cold Fusion 5.0 by
  • Casco, Steve Vaccaro, Dave, Meyer, Greg
Material type: Text Book
Publication details: Syngress Publishing 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 4.6 .

83.
Hack Proofing Sun Solaris 8 by
  • Cook, Randy, Flynn, Hal
Material type: Text Book
Publication details: Syngress Publishing 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

84.
Hack Proofing Windows 2000 Server Security by
  • Todd, Chad, Johnson, Norris L
Material type: Text Book
Publication details: Syngress Publishing 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 4.6 .

85.
Hack Proofing XML by
  • Loeb, Larry, Carter Jr., Dr. Everett F
Material type: Text Book
Publication details: Syngress Publishing 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

86.
Hack Proofing Your E-Commerce Site The Only Way to Stop a Hacker Is to Think Like One by
  • Russell, Ryan, Huston, L. Brent
Material type: Text Book
Publication details: Syngress Publishing 2000
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

87.
Hacking The Art of Exploitation by
  • Erickson, Jon
Material type: Text Book
Publication details: No Starch Press, Incorporated 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

88.
Hacking the Code ASP. NET Web Application Security by
  • Burnett, Mark
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 4.6 .

89.
Homeland Security Techniques and Technologies by
  • Mena, Jesus
Material type: Text Book
Publication details: Charles River Media 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 006.3/12 .

90.
Information Security Management Global Challenges in the New Millennium by
  • Dhillon, Gurpreet
Material type: Text Book
Publication details: Idea Group Publishing 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 658.5 .

91.
Information Security Policies and Actions in Modern Integrated Systems by
  • Fugini, Mariagrazia, Bellettini, Carlo
Material type: Text Book
Publication details: Idea Group Inc. 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 .

92.
Invasion of Privacy Big Brother and the Company Hackers by
  • Weber, Michael
Material type: Text Book
Publication details: Course PTR 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 323.4/483 .

93.
IT Solutions Series Information Technology Security:Advice from Experts by
  • Oliva, Lawrence
Material type: Text Book
Publication details: Idea Group Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.82 .

94.
Java Security by
  • Sethi, Harpreet, NIIT (Corporation) Staff
Material type: Text Book
Publication details: Course Technology 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

95.
Linux Security by
  • Siddiqui, Shadab
Material type: Text Book
Publication details: Course Technology 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

96.
Network Interdiction and Stochastic Integer Programming by
  • Woodruff, David L
Material type: Text Book
Publication details: Kluwer Academic Publishers 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

97.
Programmer's Ultimate Security DeskRef by
  • Foster, James
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.1 .

98.
Security Planning and Disaster Recovery by
  • Maiwald, Eric, Sieglein, William
Material type: Text Book
Publication details: McGraw-Hill Professional 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

99.
Sockets, Shellcode, Porting, and Coding Reverse Engineering Exploits and Tool Coding for Security Professionals by
  • Foster, James C
Material type: Text Book
Publication details: Syngress Publishing 2005
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: .

100.
SSCP Study Guide & DVD Training System by
  • Jacobs, Josh Dalton, Michael, Clemmer, Lee
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: .

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2023. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832

Powered by Koha