Results
|
|
1.
|
Cryptography and Network Security by
Material type: Text
Publication details: New Delhi BPB Publications 2025
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 TRI/C, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 TRI/C.
|
|
|
2.
|
Assessing and Insuring Cybersecurity Risk by
Material type: Text
Publication details: Boca Raton CRC Press 2025
Availability: Items available for loan: IIIT Kottayam Central Library (5)Collection, call number: 005.8 DAS/A, ...
|
|
|
3.
|
|
|
|
4.
|
Python for Cybersecurity Cookbook by
Material type: Text
Publication details: New Delhi BPB Publications 2025
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.8 KRI/P, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 KRI/P.
|
|
|
5.
|
Human Dimensions of Cybersecurity by
Material type: Text
Publication details: Boca Raton CRC Press 2025
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 BOS/H, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 BOS/H.
|
|
|
6.
|
Cybersecurity Fundamentals by
Material type: Text
Publication details: New Delhi BPB Publications 2025
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 GOU/C, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 GOU/C.
|
|
|
7.
|
CompTIA CASP+ (CAS-005) Certification Guide by
Edition: 2nd Ed
Material type: Text
Publication details: New Delhi BPB Publications 2025
Other title: - CompTIA CASP+ (CAS-005) Certification Guide: Expert resource for advanced cybersecurity concepts and vulnerability assessment techniques, with mock exams and real-world scenarios
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.82 BHA/C, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.82 BHA/C.
|
|
|
8.
|
|
|
|
9.
|
Zero Trust Security : A Complete Guide by
Material type: Text
Publication details: New Delhi BPB Publications 2023
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 AND/Z, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 AND/Z.
|
|
|
10.
|
Security for Containers and Kubernetes by
Material type: Text
Publication details: New Delhi BPB Publications 2023
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 AVE/S, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 AVE/S.
|
|
|
11.
|
|
|
|
12.
|
|
|
|
13.
|
Fundamental of Cyber Security : Principles, Theory and Practices by
Material type: Text
Publication details: New Delhi BPB Publications 2025
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 005.8 BHU/F. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 BHU/F. Not available: IIIT Kottayam Central Library: Checked out (1).
|
|
|
14.
|
|
|
|
15.
|
Cyber Security : With Cryptography Essentials by
Material type: Text
Publication details: Chennai McGraw Hill Education 2025
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 SHA/C, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 SHA/C.
|
|
|
16.
|
Ethical Haching and Penetration Testing Guide by
Material type: Text
Publication details: Boca Raton CRC Press 2025
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 005.87 BAL/E;1. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.87 BAL/E.
|
|
|
17.
|
The basics of IT audit : purposes, processes, and practical information by
Material type: Text
Publication details: Waltham Elsevier c2014
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 GAN/T;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 GAN/T.
|
|
|
18.
|
Risk management for security professionals Carl A. Roper. by
Material type: Text
Publication details: Boston : Butterworth-Heinemann, 2010
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 658.47 ROP/R;1. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 658.47 ROP/R.
|
|
|
19.
|
Applied network security monitoring : collection, detection, and analysis by
Material type: Text
Publication details: USA Elsevier 2014
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 SAN/A;1, ... Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 005.8 SAN/A.
|
|
|
20.
|
|