Results
|
1.
|
High-performance communication networks by
Edition: 2nd ed
Material type: Text
Publication details: New Delhi Elsevier 2014
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 621.382 1 WAL/H;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 621.382 1 WAL/H.
|
|
2.
|
The basics of IT audit : purposes, processes, and practical information by
Material type: Text
Publication details: Waltham Elsevier c2014
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 GAN/T;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 GAN/T.
|
|
3.
|
Applied network security monitoring : collection, detection, and analysis by
Material type: Text
Publication details: USA Elsevier 2014
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 SAN/A;1, ... Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 005.8 SAN/A.
|
|
4.
|
Handbook of database security : applications and trends by
Material type: Text
Publication details: New Delhi Springer, 2023
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 005.8 GER/H;1. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 GER/H.
|
|
5.
|
IT auditing : using controls to protect information assets by
Edition: 2nd ed.
Material type: Text
Publication details: Chennai McGraw Hill 2011
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 DAV/I, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 DAV/I.
|
|
6.
|
Securing the cloud : cloud computer security techniques and tactics by
Material type: Text
Publication details: Waltham, MA Syngress/Elsevier, 2011
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 WIN/S;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 WIN/S.
|
|
7.
|
|
|
8.
|
Cloud security and privacy An Enterprise Perspective on Risks and Compliance by Series:
Material type: Text
Publication details: Mumbai Shroff Publication & Distribution O'Reilly, 2023
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 MAT/C;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 MAT/C.
|
|
9.
|
|
|
10.
|
The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory by
Material type: Text
Publication details: Indianapolis John wiley& Sons 2014
Other title: - Detecting Malware and Threats in Windows, Linux, and Mac Memory
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.8 LIG/A, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 LIG/A. Not available: IIIT Kottayam Central Library: Checked out (1).
|
|
11.
|
|
|
12.
|
Ad Hoc Wireless Networks : Architecture and Protocols by
Material type: Text
Publication details: Noida Pearson India Education 2004
Availability: Items available for loan: IIIT Kottayam Central Library (6)Collection, call number: 621.391 MUR/A, ... Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 621.391 MUR/A. Not available: IIIT Kottayam Central Library: Checked out (1).
|
|
13.
|
Computer Fundamentals and Programming in C by
Edition: 2nd Ed.
Material type: Text
Publication details: New Delhi Oxford University Press 2016
Availability: Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 005.133 C THA/C.
|
|
14.
|
|