Your search returned 178 results.

Sort
Results
121.
Introduction to modern cryptography by Jonathan Katz and Yehuda lindell by
  • Katz, Jonathan,
  • Lindell, Yehuda
Series: Chapman and Hall Cryptography and network security ;
Material type: Text Book
Publication details: New York Chapman & Hall 2007
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 KAT.

122.
Security and usability : Designing secure systems that people can use ed by Lorrie Faith Cranor and Simson Garfinkel by
  • Cranor, Lorrie Faith., ed
  • Garfinkel, Simson., ed
Material type: Text Book
Publication details: Beijing O'REILLY 2005
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 P051.

123.
Multimedia Data Hiding by Min Wu and Bede Liu by
  • Wu, Min and Liu, Bede
Material type: Text Book
Publication details: New York Springer 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 006.7 P031.

124.
Computer safety, reliability and security Proceedings ed by Wolfgang Ehrenberger by
  • International Conference on Computer safety, reliability and security (17th Heidelberg 1998)
  • Ehrenberger, Wolfgang
Series: Lecture Notes in Computer Science ; 1516
Material type: Text Book
Publication details: Berlin Springer 1998
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 004.0289 N98.

125.
Information security and privacy Proceedings ed by Vijay Varadharajan, et al by
  • Australasian Conference on Information security and privacy (6th Sydney 2001)
  • Varadharajan, Vijay., ed
Series: Lecture Notes in Computer Science ; 2119
Material type: Text Book
Publication details: Berlin Springer 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 P011.

126.
Professional web services security by Ben Galbraith. et al by
  • Galbraith, Ben
  • Hankison, Whitney
Material type: Text Book
Publication details: UK Wrox Press 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 004.678068 P02.

127.
Cryptographic hardware and embedded systems- CHES 2001 third international workshop, Paris, France, May 14-16, 2001: proceedings. by Koç, Çetin K.; Naccache, David; Paar, Christof,(ed.) by
  • Koç, Çetin K,
  • Koc, Cetin K., et al
Series: Lecture Notes in Computer Science ; 2162
Material type: Text Book
Publication details: Berlin; Springer, 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 KOC/C.

128.
Information security management handbook ed by Harold F Tipton and Micki Krause by
  • Tipton, Harold F., ed
  • Krause, Micki., ed
Edition: 4th ed.
Material type: Text Book
Publication details: USA AUERBACH 2000
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82068 P "R".

129.
Information security management handbook ed by Harold F Tipton and Micki Krause by
  • Tipton, Harold F
  • Krause, Micki
Edition: 4th ed
Material type: Text Book
Publication details: Boca Raton AUERBACH 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82068 P01.2.

130.
Information Security Management Handbook, Vol.3 ed by Harold F Tipton and Micki Krause by
  • Tipton, Harold F., ed
  • Krause, Micki., ed
Edition: 4th ed
Material type: Text Book
Publication details: Boca Raton AUERBACH 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 P02.3.

131.
Foundations of Security What every Programmer Needs to Know by Neil Daswani by
  • Daswani, Neil. et al
  • Kern Christoph
  • Kesavan Anita
Material type: Text Book
Publication details: United States of America Springer 2007
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 P07.

132.
Foundations of Security What Every Programmer Needs to Know by Neil, Daswani by
  • Daswani, Neil. et al
  • Kern Christoph
  • Kesavan Anita
Material type: Text Book
Publication details: United States of America Springer 2007
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 P07;1 R(T).

133.
Maximum Linux security a hacker's guide to protecting your Linux server and workstation by Anonymous by
  • Anonymous
Material type: Text Book
Publication details: New Delhi Techmedia 1999
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.43 N996.

134.
Hacking exposed Network security secrets and solutions by Stuart Mcclure. et al by
  • Mcclure, Stuart
  • Scambray, Joel
  • Kurtz, George
Material type: Text Book
Publication details: New Delhi Tata McGraw- Hill 1999
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 N997.

135.
Physical Layer Security From Information theory to security Engineering by Matthieu Bloch and Joao Barros by
  • Bloch, Matthieu
  • Barros, Joao
Material type: Text Book
Publication details: Cambridge Cambridge University Press 2011
Availability: Items available for loan: Electrical Communication Engineering (1)Call number: 621.38202858 P11 (ECE).

136.
Introduction to modern cryptography by Jonathan Katz and Yehuda Lindell by
  • Katz, Jonathan
  • Lindell, Yehuda
Series: Chapman and Hall/CRC cryptography and network security
Material type: Text Book
Publication details: Boca Raton Chapman and Hall/CRC 2008
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P082 (CSA).

137.
ASP in a nutshell A Desktop Quick Reference by A Keyton Weissinger by
  • Weissinger, A Keyton
Material type: Text Book
Publication details: Beijing O'Reilly 1999
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.71 N99.

138.
Network anomaly detection a machine learning perspective by Dhruba Kumar Bhattacharyya and Jugal Kumar Kalita by
  • Bhattacharyya, Dhruba Kumar
  • Kalita, Jugal Kumar
Material type: Text Book
Publication details: New York CRC Press 2014
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P14 (CSA).

139.
Introduction to modern cryptography by Jonathan Katz and Yehuda Lindell by
  • Katz, Jonathan
  • Lindell, Yehuda
Series: Chapman and Hall/CRC cryptography and network security
Material type: Text Book
Publication details: Boca Raton Chapman and Hall/CRC 2008
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P082;1 (CSA).

140.
Applied cryptography Protocols, algorithms, and source code in C by Bruce Schneier by
  • Schneier, Bruce
Material type: Text Book
Publication details: New York John Wiley & Sons 1996
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 N96;4 (CSA).

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2023. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832

Powered by Koha