Your search returned 4 results.

Sort
Results
1.
Securing the cloud : cloud computer security techniques and tactics by
Material type: Text Text
Publication details: Waltham, MA Syngress/Elsevier, 2011
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 WIN/S;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 WIN/S.

2.
Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem by
Edition: 2nd Ed
Material type: Text Text
Publication details: Birmingham Packt Publishers 2018
Availability: Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 004.678 RUS/P. Not available: IIIT Kottayam Central Library: Checked out (1).

3.
The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory by
Material type: Text Text
Publication details: Indianapolis John wiley& Sons 2014
Other title:
  • Detecting Malware and Threats in Windows, Linux, and Mac Memory
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.8 LIG/A, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 LIG/A. Not available: IIIT Kottayam Central Library: Checked out (1).

4.
Auditing IT Infrastructures for Compliance by Series: Information Systems Security & Assurance Series
Edition: 3rd Ed
Material type: Text Text
Publication details: Newyork Jones&Bartelett Learning 2024
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 JOH/A, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 JOH/A.

Pages
IIIT Kottayam Logo       © IIIT Kottayam 2023. All rights reserved.