Your search returned 209 results.

Sort
Results
61.
Finding and Fixing Vulnerabilities in Information Systems The Vulnerability Assessment and Mitigation Methodology by
  • Anton, Philip S. Mesic, Richard, Anderson, Robert H
Material type: Text Book
Publication details: Rand Corporation, The 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

62.
Hacking The Art of Exploitation by
  • Erickson, Jon
Material type: Text Book
Publication details: No Starch Press, Incorporated 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

63.
Hacking the Code ASP. NET Web Application Security by
  • Burnett, Mark
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 658.47 .

64.
Homeland Security Techniques and Technologies by
  • Mena, Jesus
Material type: Text Book
Publication details: Charles River Media 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 006.3/12 .

65.
Hack Proofing Cold Fusion 5.0 by
  • Casco, Steve Vaccaro, Dave, Meyer, Greg
Material type: Text Book
Publication details: Syngress Publishing 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 1.6425 .

66.
Hack Proofing Sun Solaris 8 by
  • Cook, Randy, Flynn, Hal
Material type: Text Book
Publication details: Syngress Publishing 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

67.
Hack Proofing Windows 2000 Server Security by
  • Todd, Chad, Johnson, Norris L
Material type: Text Book
Publication details: Syngress Publishing 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

68.
Hack Proofing XML by
  • Loeb, Larry, Carter Jr., Dr. Everett F
Material type: Text Book
Publication details: Syngress Publishing 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

69.
Hack Proofing Your E-Commerce Site The Only Way to Stop a Hacker Is to Think Like One by
  • Russell, Ryan, Huston, L. Brent
Material type: Text Book
Publication details: Syngress Publishing 2000
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

70.
Information Security Management Global Challenges in the New Millennium by
  • Dhillon, Gurpreet
Material type: Text Book
Publication details: Idea Group Publishing 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 658.47 .

71.
Information Security Policies and Actions in Modern Integrated Systems by
  • Fugini, Mariagrazia, Bellettini, Carlo
Material type: Text Book
Publication details: Idea Group Inc. 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 .

72.
Invasion of Privacy Big Brother and the Company Hackers by
  • Weber, Michael
Material type: Text Book
Publication details: Course PTR 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 323.4/483 .

73.
IT Solutions Series Information Technology Security:Advice from Experts by
  • Oliva, Lawrence
Material type: Text Book
Publication details: Idea Group Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 658.47 .

74.
Java Security by
  • Sethi, Harpreet, NIIT (Corporation) Staff
Material type: Text Book
Publication details: Course Technology 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.2 .

75.
Linux Security by
  • Siddiqui, Shadab
Material type: Text Book
Publication details: Course Technology 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

76.
Network Interdiction and Stochastic Integer Programming by
  • Woodruff, David L
Material type: Text Book
Publication details: Kluwer Academic Publishers 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

77.
Programmer's Ultimate Security DeskRef by
  • Foster, James
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: .

78.
Security Planning and Disaster Recovery by
  • Maiwald, Eric, Sieglein, William
Material type: Text Book
Publication details: McGraw-Hill Professional 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: .

79.
Sockets, Shellcode, Porting, and Coding Reverse Engineering Exploits and Tool Coding for Security Professionals by
  • Foster, James C
Material type: Text Book
Publication details: Syngress Publishing 2005
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: .

80.
SSCP Study Guide & DVD Training System by
  • Jacobs, Josh Dalton, Michael, Clemmer, Lee
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: .

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2023. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832

Powered by Koha