Your search returned 209 results.

Sort
Results
161.
Hacking exposed Network security secrets and solutions by Stuart Mcclure. et al by
  • Mcclure, Stuart
  • Scambray, Joel
  • Kurtz, George
Material type: Text Book
Publication details: New Delhi Tata McGraw- Hill 1999
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 N997.

162.
Physical Layer Security From Information theory to security Engineering by Matthieu Bloch and Joao Barros by
  • Bloch, Matthieu
  • Barros, Joao
Material type: Text Book
Publication details: Cambridge Cambridge University Press 2011
Availability: Items available for loan: Electrical Communication Engineering (1)Call number: 621.38202858 P11 (ECE).

163.
Introduction to modern cryptography by Jonathan Katz and Yehuda Lindell by
  • Katz, Jonathan
  • Lindell, Yehuda
Series: Chapman and Hall/CRC cryptography and network security
Material type: Text Book
Publication details: Boca Raton Chapman and Hall/CRC 2008
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P082 (CSA).

164.
Model-checking infinite state systems for information flow security properties by K R Raghavendra by
  • Raghavendra, K R,
Series: IISc Dept of CSA. PhD Thesis ;
Material type: Text Book
Publication details: Bangalore IISc 2013
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.8 P131 "THESIS".

165.
ASP in a nutshell A Desktop Quick Reference by A Keyton Weissinger by
  • Weissinger, A Keyton
Material type: Text Book
Publication details: Beijing O'Reilly 1999
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.71 N99.

166.
Network anomaly detection a machine learning perspective by Dhruba Kumar Bhattacharyya and Jugal Kumar Kalita by
  • Bhattacharyya, Dhruba Kumar
  • Kalita, Jugal Kumar
Material type: Text Book
Publication details: New York CRC Press 2014
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P14 (CSA).

167.
Introduction to modern cryptography by Jonathan Katz and Yehuda Lindell by
  • Katz, Jonathan
  • Lindell, Yehuda
Series: Chapman and Hall/CRC cryptography and network security
Material type: Text Book
Publication details: Boca Raton Chapman and Hall/CRC 2008
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P082;1 (CSA).

168.
Applied cryptography Protocols, algorithms, and source code in C by Bruce Schneier by
  • Schneier, Bruce
Material type: Text Book
Publication details: New York John Wiley & Sons 1996
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 N96;4 (CSA).

169.
Cryptography and network security Principles and practice by William Stallings by
  • Stallings, William
Edition: 6th ed
Material type: Text Book
Publication details: Boston Columbus Pearson 2014
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 P14 (CSA).

170.
Introduction to modern cryptography by Katz Jonathan and Yehuda Lindell by
  • Katz, Jonathan
  • Lindell, Yehuda
Edition: 2nd ed.
Material type: Text Book
Publication details: Boca Rotan CRC Press 2015
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 P15;1 (CSA).

171.
Introduction to modern cryptography by Jonathan Katz and Yehuda Lindell by
  • Katz, Jonathan
  • Lindell, Yehuda
Series: Chapman and Hall/CRC cryptography and network security
Edition: 2nd ed
Material type: Text Book
Publication details: Boca Raton CRC Press 2015
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P15 (CSA).

172.
Information security practice and experience 5th International conference ISPEC ed by Feng Bao, Hui Li and Guilin Wang by
  • Bao, Feng,.ed
  • Li, Hui,.ed
  • Wang, Guilin,.ed
Series: Lecture Notes in Computer Science.5451
Material type: Text Book
Publication details: Germany Springer 2009
Availability: Items available for loan: Electrical Communication Engineering (1)Call number: 005.8 P09 (ECE).

173.
Efficient secure two-party protocols : Techniques and constructions by
  • Hazay, Carmit, Lindell, Lehuda
Material type: Text Book
Publication details: London Springer 2010
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P10;1 (CSA).

174.
Digital signatures by
  • Katz, Jonathan,
Material type: Text Book
Publication details: New York Springer 2010
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 P10;1 (CSA).

175.
Introduction to modern cryptography by Katz Jonathan and Yehuda Lindell by
  • Katz, Jonathan
  • Lindell, Yehuda
Edition: 2nd ed.
Material type: Text Book
Publication details: Boca Rotan CRC Press 2015
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 P15;2.

176.
Web Security: A WhiteHat Perspective by Hanqing Wu and Liz Zhao by
  • Hanqing, Wu
  • Zhao, Liz
Material type: Text Book
Publication details: Boca Raton T & F Group 2015
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 P154.

177.
Discrete dynamical systems and chaotic machines: Theory and applications by Jaques M Bahi and Christophe Guyeux by
  • Bahi, Jacques M
  • Guyeux, Christophe
Series: Chapman and Hall/ CRC Numerical Analysis and Scientific Computing ;
Material type: Text Book
Publication details: New York CRC Press 2013
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 P132.

178.
Secure Multiparty Computation and Secret Sharing by Ronald Cramer, Ivan Bjerre Damgard and Jesper Buus Nielsen by
  • Cramer, Ronald
  • Damgard, Ivan Bjerre
  • Nielsen, Jesper Buus
Material type: Text Book
Publication details: Cambridge CUP 2015
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P151 (CSA).

179.
Threat modeling : Design for security by Adam Shostack by
  • Shostack, Adam
Material type: Text Book
Publication details: New Delhi Wiley 2014
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 P14.

180.
Modern cryptanalysis: Techniques for advanced code breaking by Christopher Swenson by
  • Swenson, Christopher
Material type: Text Book
Publication details: Canada Wiley 2008
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 P08.

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2023. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832

Powered by Koha