Your search returned 42 results.

Sort
Results
1.
Securing the cloud : cloud computer security techniques and tactics by
Material type: Text Text
Publication details: Waltham, MA Syngress/Elsevier, 2011
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 WIN/S;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 WIN/S.

2.
Network security essentials : applications and standards by
Edition: 6th ed
Material type: Text Text
Publication details: Noida Pearson Education 2023
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 STA/N;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 STA/N.

3.
Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem by
Edition: 2nd Ed
Material type: Text Text
Publication details: Birmingham Packt Publishers 2018
Availability: Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 004.678 RUS/P. Not available: IIIT Kottayam Central Library: Checked out (1).

4.
Machine learning and security : protecting systems with data and algorithms by
Edition: First edition.
Material type: Text Text
Publication details: Mumbai Shroff Publishers & Distributors 2024
Other title:
  • Machine learning & security : protecting systems with data and algorithms
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 006.31 CHI/M;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 006.31 CHI/M.

5.
Mobile Forensics Cookbook: Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools by
Material type: Text Text
Publication details: Mumbai Packt Publishing 2017
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 005.8 MIK/M;1. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 MIK/M.

6.
Fundamentals of Digital Forensics : Theory, Methods, and Real-Life Applications by
Edition: 2nd Ed.
Material type: Text Text
Publication details: London Springer
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 005.8 KAV/F;1. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 KAV/F.
Lists:

7.
Digital watermarking and steganography / Ingemar J. Cox ... [et al.]. by
Edition: 2nd ed.
Material type: Text Text
Publication details: Amsterdam ; Boston : Morgan Kaufmann Publishers, c2008
Availability: Not available: IIIT Kottayam Central Library: Checked out (1).

8.
System Forensics, Investigation, and Response by Series: Information Systems Security & Assurance Series
Edition: 3rd Ed
Material type: Text Text
Publication details: Burlington Jones& Bartlett Learning 2014
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 EAS/S, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 EAS/S.

9.
Federated Learning for Internet of Medical things : Concepts, Paradigms and Solutions by
Material type: Text Text
Publication details: Boca Raton, Florida CRC Press 2023
Availability: Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 610.285 BHA/F.

10.
Managing Risk in Information Systems by Series: Information Systems Security & Assurance Series
Edition: 3rd
Material type: Text Text
Publication details: Burlington Jones & Bartlett Learning 2022
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.8 GIB/M, ... Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 005.8 GIB/M.

11.
Distributed Systems Security :Issues, Processes and Solutions by
Material type: Text Text
Publication details: New Jersey John Wiley & Sons, 2009
Availability: Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 BEL/D.

12.
The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory by
Material type: Text Text
Publication details: Indianapolis John wiley& Sons 2014
Other title:
  • Detecting Malware and Threats in Windows, Linux, and Mac Memory
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.8 LIG/A, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 LIG/A. Not available: IIIT Kottayam Central Library: Checked out (1).

13.
Guide to Computer Forensics and Investigations by
Edition: 6th Ed.
Material type: Text Text
Publication details: New Delhi Cengage Learning 2019
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 NEL/G, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 NEL/G.

14.
Social Engineering : The Science of Human Hacking by
Edition: 2nd edition.
Material type: Text Text
Publication details: Indianapolis John wiley & Sons 2018
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 HAD/S, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 HAD/S.

15.
Practical Malware Analysis : The Hands-On Guide to Dissecting Malicious Software by
Material type: Text Text
Publication details: San Francisco : No Starch Press, ©2012
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.84 SIK/P, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.84 SIK/P. Not available: IIIT Kottayam Central Library: Checked out (1).

16.
Auditing IT Infrastructures for Compliance by Series: Information Systems Security & Assurance Series
Edition: 3rd Ed
Material type: Text Text
Publication details: Newyork Jones&Bartelett Learning 2024
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 JOH/A, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 JOH/A.

17.
Applied Predictive Analytics: Principles and Techniques for the Professional Data Analyst by Series: ; Wiley EBooks 6 Year Subscription
Material type: Text Text
Publication details: New Delhi Wiley India
Availability: Items available for reference: IIIT Kottayam Central Library: Not for loan (1).
Lists:

18.
Data Science and Big Data Analytics: Discovering, Analyzing, Visualizing and Presenting Data by Series: ; Wiley EBooks 6 Year Subscription
Material type: Text Text
Publication details: New Delhi Wiley India
Availability: Items available for reference: IIIT Kottayam Central Library: Not for loan (1).

19.
Professional Hadoop Solutions by Series: ; Wiley EBooks 6 Year Subscription
Material type: Text Text
Publication details: New Delhi Wiley India
Availability: Items available for reference: IIIT Kottayam Central Library: Not for loan (1).
Lists:

20.
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2nd Edition by Series: ; Wiley EBooks 6 Year Subscription
Material type: Text Text
Publication details: New Delhi Wiley India
Availability: Items available for reference: IIIT Kottayam Central Library: Not for loan (1).
Lists:

Pages
IIIT Kottayam Logo       © IIIT Kottayam 2023. All rights reserved.