Your search returned 209 results.

Sort
Results
41.
Pedagogies and technologies for the emerging global economy. FIE 2005. Conference proceeding. Vol.1 of 3 by
  • IEEE Frontiers in educations (35 2005 Indianapolis)
Material type: Text Book
Publication details: Piscataway IEEE 2005
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 620.007106 P05.1 "SER".

42.
Pedagogies and technologies for the emerging global economy. FIE 2005. Conference proceedings. Vol.2 of 3 by
  • IEEE Frontiers in education (35 2005 Indianapolis)
Material type: Text Book
Publication details: Piscataway IEEE 2005
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 620.007106 P05.2 "SER".

43.
Biometrics Advanced identity verification:The complete guide by Julian Ashbourn by
  • Ashbourn, Julian D
Material type: Text Book
Publication details: London Springer 2000
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 570.15191 P002 R(T).

44.
Security modeling and analysis of mobile agent systems by Lu Ma and Jeffrey J.P. Tsai by
  • Ma, Lu
  • Tsai, Jeffrey J.P
Material type: Text Book
Publication details: London Imperial College Press 2006
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 621.38456028558 P06.

45.
Advances in Information Security Management & Small Systems Security by
  • Eloff, Jan H. P
Material type: Text Book
Publication details: Kluwer Academic Publishers 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 658.0558 P01.

46.
CCSA CP2000 by
  • Stovall, Les
Material type: Text Book
Publication details: Coriolis Group, LLC, The 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

47.
Check Point Next Generation Security Administration by
  • Amon, Cherie Simonis, Drew, Kligerman, Daniel
Material type: Text Book
Publication details: Syngress Publishing 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: QA76.9.A25.C454 2002beb.

48.
Check Point NG VPN-1/FireWall-1 Advanced Configuration and Troubleshooting by
  • Noble, Jim
  • Maxwell, Doug
  • Hourihan, Kyle X
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 .

49.
Computers at Risk Safe Computing in the Information Age by
  • National Research Council Staff
Material type: Text Book
Publication details: National Academies Press 1990
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

50.
Configuring ISA Server 2000 Building Firewalls for Windows 2000 by
  • Shinder, Thomas Grasdal, Martin, Shinder, Deb
Material type: Text Book
Publication details: Syngress Publishing 2000
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

51.
Configuring Symantec AntiVirus Corporate Edition by
  • Shimonski, Robert J. Kahn, Athar A, Hunter, Laura E
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

52.
Crackproof Your Software Protect Your Software Against Crackers by
  • Cerven, Pavol
Material type: Text Book
Publication details: No Starch Press 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

53.
CURRENT SECURITY MANAGEMENT & ETHICAL ISSUES OF INFORMATION TECHNOLOGY by
  • Azari, Rasool
Material type: Text Book
Publication details: Idea Group Inc. 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

54.
Cyber Adversary Characterization Auditing the Hacker Mind by
  • Parker, Tom Shaw, Eric, Sachs, Marcus H
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 .

55.
Data Privacy in the Information Age by
  • Klosek, Jacqueline
Material type: Text Book
Publication details: Greenwood Publishing Group, Incorporated 2000
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

56.
Disaster Proofing Information Systems by
  • Buchanan, Robert W
Material type: Text Book
Publication details: McGraw-Hill Professional Publishing 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8/6 .

57.
Dr. Tom Shinder's Configuring ISA Server 2004 by
  • Shinder, Thomas, Littlejohn, Shind
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.7/1376 .

58.
ExamInsight For CompTIA Security+ Certification (SY0-101) Second Edition by
  • Houser, Tcat, O'Boyle, Helen
Material type: Text Book
Publication details: TotalRecall Publications 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 4.6 .

59.
ExamWise For CompTIA Security+ Examination (SY0-101) by
  • Houser, Tcat, O'Boyle, Helen
Material type: Text Book
Publication details: TotalRecall Publications 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: .

60.
Executive's Guide to Privacy Management by
  • Erbschloe, Michael
Material type: Text Book
Publication details: McGraw-Hill Trade 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 658.4/78 .

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2023. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832

Powered by Koha