IIIT Kottayam Logo
Indian Institute of Information Technology Kottayam
भारतीय सूचना प्रौद्योगिकी संस्थान कोट्टायम
Library Catalogue

Your search returned 33 results.

Sort
Results
1.
Ethical Haching and Penetration Testing Guide by
Material type: Text Text
Publication details: Boca Raton CRC Press 2025
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 005.87 BAL/E;1. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.87 BAL/E.
Lists:

2.
The basics of IT audit : purposes, processes, and practical information by
Material type: Text Text
Publication details: Waltham Elsevier c2014
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 GAN/T;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 GAN/T.
Lists:

3.
Risk management for security professionals Carl A. Roper. by
Material type: Text Text
Publication details: Boston : Butterworth-Heinemann, 2010
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 658.47 ROP/R;1. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 658.47 ROP/R.
Lists:

4.
Applied network security monitoring : collection, detection, and analysis by
Material type: Text Text
Publication details: USA Elsevier 2014
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 SAN/A;1, ... Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 005.8 SAN/A.
Lists:

5.
Implementing database security and auditing : a guide for DBA's, information security administrators and auditors by
Material type: Text Text
Publication details: New delhi Elsevier 2022
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 BEN/I;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 BEN/I.
Lists:

6.
Handbook of database security : applications and trends by
Material type: Text Text
Publication details: New Delhi Springer, 2023
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 005.8 GER/H;1. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 GER/H.
Lists:

7.
IT auditing : using controls to protect information assets by
Edition: 2nd ed.
Material type: Text Text
Publication details: Chennai McGraw Hill 2011
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 DAV/I, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 DAV/I.
Lists:

8.
Network security : private communications in a public world by
Edition: 3rd ED
Material type: Text Text
Publication details: Noida Pearson Education 2024
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 KAU/N;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 KAU/N.
Lists:

9.
Securing the cloud : cloud computer security techniques and tactics by
Material type: Text Text
Publication details: Waltham, MA Syngress/Elsevier, 2011
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 WIN/S;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 WIN/S.
Lists:

10.
Network security essentials : applications and standards by
Edition: 6th ed
Material type: Text Text
Publication details: Noida Pearson Education 2023
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 STA/N;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 STA/N.
Lists:

11.
Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem by
Edition: 2nd Ed
Material type: Text Text
Publication details: Birmingham Packt Publishers 2018
Availability: Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 004.678 RUS/P. Not available: IIIT Kottayam Central Library: Checked out (1).
Lists:

12.
Machine learning and security : protecting systems with data and algorithms by
Edition: First edition.
Material type: Text Text
Publication details: Mumbai Shroff Publishers & Distributors 2024
Other title:
  • Machine learning & security : protecting systems with data and algorithms
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 006.31 CHI/M;1. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 006.31 CHI/M. Not available: IIIT Kottayam Central Library: Checked out (1).
Lists:

13.
Mobile Forensics Cookbook: Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools by
Material type: Text Text
Publication details: Mumbai Packt Publishing 2017
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 005.8 MIK/M;1. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 MIK/M.
Lists:

14.
Fundamentals of Digital Forensics : Theory, Methods, and Real-Life Applications by
Edition: 2nd Ed.
Material type: Text Text
Publication details: London Springer
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 005.8 KAV/F;1. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 KAV/F.

15.
Guidelines on Security and Privacy in Public Cloud Computing by Series:
Material type: Text Text
Publication details: Gaithersburg NIST Special Publications c2011
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 004.6782 JAN/G;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 004.6782 JAN/G.
Lists:

16.
The security risk assessment handbook : a complete guide for performing security risk assessments by
Edition: 3rd Ed
Material type: Text Text
Publication details: Boca Raton CRC Press 2021
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 005.8 LAN/S;1. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 LAN/S.
Lists:

17.
System Forensics, Investigation, and Response by Series: Information Systems Security & Assurance Series
Edition: 3rd Ed
Material type: Text Text
Publication details: Burlington Jones& Bartlett Learning 2014
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 EAS/S, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 EAS/S.

18.
Managing Risk in Information Systems by Series: Information Systems Security & Assurance Series
Edition: 3rd
Material type: Text Text
Publication details: Burlington Jones & Bartlett Learning 2022
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.8 GIB/M;1, ... Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 005.8 GIB/M.

19.
The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory by
Material type: Text Text
Publication details: Indianapolis John wiley& Sons 2014
Other title:
  • Detecting Malware and Threats in Windows, Linux, and Mac Memory
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.8 LIG/A, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 LIG/A. Not available: IIIT Kottayam Central Library: Checked out (1).

20.
Guide to Computer Forensics and Investigations by
Edition: 6th Ed.
Material type: Text Text
Publication details: New Delhi Cengage Learning 2019
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 NEL/G, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 NEL/G.

Pages

IIIT Kottayam Central Library,Valavoor.P.O, Kottayam-686635,Kerala | Phone: 0482-2202104, Mobile: 9961452785| library@iiitkottayam.ac.in