Your search returned 164 results.

Sort
Results
61.
Hack Proofing Your E-Commerce Site The Only Way to Stop a Hacker Is to Think Like One by
  • Russell, Ryan, Huston, L. Brent
Material type: Text Book
Publication details: Syngress Publishing 2000
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

62.
Information Security Management Global Challenges in the New Millennium by
  • Dhillon, Gurpreet
Material type: Text Book
Publication details: Idea Group Publishing 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 658.47 .

63.
Information Security Policies and Actions in Modern Integrated Systems by
  • Fugini, Mariagrazia, Bellettini, Carlo
Material type: Text Book
Publication details: Idea Group Inc. 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 .

64.
Invasion of Privacy Big Brother and the Company Hackers by
  • Weber, Michael
Material type: Text Book
Publication details: Course PTR 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 323.4/483 .

65.
IT Solutions Series Information Technology Security:Advice from Experts by
  • Oliva, Lawrence
Material type: Text Book
Publication details: Idea Group Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 658.47 .

66.
Java Security by
  • Sethi, Harpreet, NIIT (Corporation) Staff
Material type: Text Book
Publication details: Course Technology 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.2 .

67.
Linux Security by
  • Siddiqui, Shadab
Material type: Text Book
Publication details: Course Technology 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

68.
Network Interdiction and Stochastic Integer Programming by
  • Woodruff, David L
Material type: Text Book
Publication details: Kluwer Academic Publishers 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

69.
Programmer's Ultimate Security DeskRef by
  • Foster, James
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: .

70.
Security Planning and Disaster Recovery by
  • Maiwald, Eric, Sieglein, William
Material type: Text Book
Publication details: McGraw-Hill Professional 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: .

71.
Sockets, Shellcode, Porting, and Coding Reverse Engineering Exploits and Tool Coding for Security Professionals by
  • Foster, James C
Material type: Text Book
Publication details: Syngress Publishing 2005
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: .

72.
SSCP Study Guide & DVD Training System by
  • Jacobs, Josh Dalton, Michael, Clemmer, Lee
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: .

73.
Technology and Privacy The New Landscape by
  • Rotenberg, Marc, Agre, Philip E
Material type: Text Book
Publication details: MIT Press 1997
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 323.448 .

74.
Trusted Information The New Decade Challenge by
  • Dupuy, Michel, Paradinas, Pierre
Material type: Text Book
Publication details: Kluwer Academic Publishers 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

75.
Windows 2000 Security by
  • Gupta, Rashi, NIIT (Corporation) Staff
Material type: Text Book
Publication details: Course Technology 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

76.
Windows(R) XP Professional Security by
  • Weber, Chris, Bahadur, Gary
Material type: Text Book
Publication details: McGraw-Hill Osborne 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

77.
XML Security by
  • Dournaee, Blake
Material type: Text Book
Publication details: McGraw-Hill Professional 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: .

78.
Snort 2.0 Intrusion Detection by
  • Beale, Jay Posluns, Jeffrey, Foster, James C
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

79.
Snort 2.1 Intrusion Detection by
  • Caswell, Brian, Beale, Jay
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 .

80.
Strategic Information Security by
  • Wylder, John
Material type: Text Book
Publication details: Auerbach Publishers, Incorporated 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 658.5 .

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2023. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832

Powered by Koha