Results
|
|
21.
|
|
|
|
22.
|
Digital watermarking and steganography / by
Edition: 2nd ed.
Material type: Text
Publication details: Amsterdam ; Boston : Morgan Kaufmann Publishers, c2008
Availability: Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 COX/D. Not available: IIIT Kottayam Central Library: Checked out (1).
|
|
|
23.
|
|
|
|
24.
|
Guidelines on Security and Privacy in Public Cloud Computing by Series:
Material type: Text
Publication details: Gaithersburg NIST Special Publications c2011
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 004.6782 JAN/G;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 004.6782 JAN/G.
|
|
|
25.
|
|
|
|
26.
|
|
|
|
27.
|
Managing Risk in Information Systems by Series: Information Systems Security & Assurance Series
Edition: 3rd
Material type: Text
Publication details: Burlington Jones & Bartlett Learning 2022
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.8 GIB/M;1, ... Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 005.8 GIB/M.
|
|
|
28.
|
|
|
|
29.
|
The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory by
Material type: Text
Publication details: Indianapolis John wiley& Sons 2014
Other title: - Detecting Malware and Threats in Windows, Linux, and Mac Memory
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.8 LIG/A, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 LIG/A. Not available: IIIT Kottayam Central Library: Checked out (1).
|
|
|
30.
|
Guide to Computer Forensics and Investigations by
Edition: 6th Ed.
Material type: Text
Publication details: New Delhi Cengage Learning 2019
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 NEL/G, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 NEL/G.
|
|
|
31.
|
Social Engineering : The Science of Human Hacking by
Edition: 2nd edition.
Material type: Text
Publication details: Indianapolis John wiley & Sons 2018
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 HAD/S, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 HAD/S.
|
|
|
32.
|
|
|
|
33.
|
|
|
|
34.
|
|
|
|
35.
|
|
|
|
36.
|
Professional Hadoop Solutions by Series: ; Wiley EBooks 6 Year Subscription
Material type: Text
Publication details: New Delhi Wiley India
Availability: Items available for reference: IIIT Kottayam Central Library: Not for loan (1).
|
|
|
37.
|
|
|
|
38.
|
|
|
|
39.
|
|
|
|
40.
|
Cybersecurity Law by Series: ; Wiley EBooks 6 Year Subscription
Material type: Text
Publication details: New Delhi Wiley India
Availability: Items available for reference: IIIT Kottayam Central Library: Not for loan (1).
|