Results
                                    
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 1. | 
                                                
Ethical Haching and Penetration Testing Guide by 
Material type:  Text 
Publication details: Boca Raton CRC Press 2025
 
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number:  005.87 BAL/E;1. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number:  005.87 BAL/E. 
 | 
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 2. | 
                                                
The basics of IT audit  : purposes, processes, and practical information  by 
Material type:  Text 
Publication details: Waltham Elsevier c2014
 
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number:  005.8 GAN/T;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number:  005.8 GAN/T. 
 | 
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 3. | 
                                                
Applied network security monitoring : collection, detection, and analysis  by 
Material type:  Text 
Publication details: USA Elsevier 2014
 
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number:  005.8 SAN/A;1, ... Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number:  005.8 SAN/A. 
 | 
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 4. |  | 
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 5. | 
                                                
IT auditing : using controls to protect information assets  by 
Edition: 2nd ed. 
Material type:  Text 
Publication details: Chennai McGraw Hill 2011
 
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number:  005.8 DAV/I, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number:  005.8 DAV/I. 
 | 
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 6. | 
                                                
Securing the cloud : cloud computer security techniques and tactics  by 
Material type:  Text 
Publication details: Waltham, MA Syngress/Elsevier, 2011
 
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number:  005.8 WIN/S;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number:  005.8 WIN/S. 
 | 
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 7. |  | 
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 8. | 
                                                
Machine learning and security : protecting systems with data and algorithms  by 
Edition: First edition. 
Material type:  Text 
Publication details: Mumbai Shroff Publishers & Distributors 2024
 
Other title: Machine learning & security : protecting systems with data and algorithms 
 
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number:  006.31 CHI/M;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number:  006.31 CHI/M. 
 | 
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 9. |  | 
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 10. |  | 
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 11. | 
                                                
Digital watermarking and steganography / by 
Edition: 2nd ed. 
Material type:  Text 
Publication details: Amsterdam ; Boston : Morgan Kaufmann Publishers, c2008
 
Availability: Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number:  005.8 COX/D. Not available: IIIT Kottayam Central Library: Checked out (1). 
 | 
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 12. |  | 
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 13. | 
                                                
Guidelines on Security and Privacy in Public Cloud Computing by Series: 
Material type:  Text 
Publication details: Gaithersburg NIST Special Publications c2011
 
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number:  004.6782 JAN/G;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number:  004.6782 JAN/G. 
 | 
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 14. |  | 
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 15. |  | 
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 16. | 
                                                
The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory  by 
Material type:  Text 
Publication details: Indianapolis John wiley& Sons 2014
 
Other title: Detecting Malware and Threats in Windows, Linux, and Mac Memory
 
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number:  005.8 LIG/A, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number:  005.8 LIG/A. Not available: IIIT Kottayam Central Library: Checked out (1). 
 | 
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 17. | 
                                                
Guide to Computer Forensics and Investigations  by 
Edition: 6th Ed. 
Material type:  Text 
Publication details: New Delhi Cengage Learning 2019
 
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number:  005.8 NEL/G, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number:  005.8 NEL/G. 
 | 
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 18. | 
                                                
Social Engineering : The Science of Human Hacking  by 
Edition: 2nd edition. 
Material type:  Text 
Publication details: Indianapolis John wiley & Sons 2018
 
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number:  005.8 HAD/S, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number:  005.8 HAD/S. 
 | 
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 19. |  | 
                                    
                                        
                                            
                                            
                                                
                                            
                                            |  | 20. |  |