Title:
Security strategies in Linux platforms and applications /
|
Author:
Jang, Michael H.
|
Call No:
005.8 JAS
|
Publisher:
Jones & Bartlett Learning,
,
Sudbury, MA :
,
2011
Detail
|
|
Title:
Guide to computer forensics and investigations /
|
Author:
Nelson, Bill.
|
Call No:
005.8 NEG
|
Publisher:
Cengage Learning India Private Limitd.,
,
Not Available
,
2010
Detail
|
|
Title:
Fundamentals of information systems security
|
Author:
Kim, David.
|
Call No:
005.8 KIF
|
Publisher:
United States of America
,
Not Available
,
2018
Detail
|
|
Title:
Cyber Resilience of Systems and Networks
|
Author:
Kott, Alexander
|
Call No:
005.8 KOC
|
Publisher:
Springer
,
New Delhi
,
2019
Detail
|
|
Title:
Analyzing computer security :
|
Author:
Pfleeger, Charles P.
|
Call No:
005.8 PFA
|
Publisher:
Pearson Education International,
,
Upper Saddle River, N.J. :
,
2012
Detail
|
|
Title:
Applied cryptography :
|
Author:
Schneier, Bruce,
|
Call No:
005.82 SCA
|
Publisher:
John Wiley & Sons,
,
New York:
,
2006
Detail
|
|
Title:
Cyber smart :
|
Author:
McDonough, Bart,
|
Call No:
005.8 MCC
|
Publisher:
John Wiley and Sons
,
New Jersey
,
2019
Detail
|
|
Title:
Elements of computer security /
|
Author:
Salomon, David.
|
Call No:
005.8 SAE
|
Publisher:
Springer,
,
New Delhi:
,
2010
Detail
|
|
Title:
Information security policies, procedures, and standards :
|
Author:
Peltier, Thomas R.
|
Call No:
005.8 PEI
|
Publisher:
Auerbach Publications,
,
Boca Raton :
,
2002
Detail
|
|
Title:
Security and access control using biometric technologies /
|
Author:
Newman, Robert.
|
Call No:
005.8 NES
|
Publisher:
Cengage Learning,
,
New Delhi:
,
2010
Detail
|
|
Title:
Cyber Security
|
Author:
Lehto, Martti
|
Call No:
621.382 LEC
|
Publisher:
Springer
,
New Delhi
,
2018
Detail
|
|
Next >>
Catalogue
Books
|
Periodicals
|
Newspapers
|
Publications
|
Research Papers
|
|