IIIT Kottayam Logo
Indian Institute of Information Technology Kottayam
भारतीय सूचना प्रौद्योगिकी संस्थान कोट्टायम
Library Catalogue

Your search returned 15 results.

Sort
Results
1.
Security and privacy in internet of things (IoTs) : models, algorithms, and implementations by
Material type: Text Text
Publication details: Boca Raton CRC Press 2024
Availability: Items available for reference: IIIT Kottayam Central Library: Not For Loan (2)Collection, call number: 004.678 2 HU/S, ...
Lists:

2.
High-performance communication networks by
Edition: 2nd ed
Material type: Text Text
Publication details: New Delhi Elsevier 2014
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 621.382 1 WAL/H;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 621.382 1 WAL/H.
Lists:

3.
The basics of IT audit : purposes, processes, and practical information by
Material type: Text Text
Publication details: Waltham Elsevier c2014
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 GAN/T;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 GAN/T.
Lists:

4.
Applied network security monitoring : collection, detection, and analysis by
Material type: Text Text
Publication details: USA Elsevier 2014
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 SAN/A;1, ... Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 005.8 SAN/A.
Lists:

5.
Handbook of database security : applications and trends by
Material type: Text Text
Publication details: New Delhi Springer, 2023
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 005.8 GER/H;1. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 GER/H.
Lists:

6.
IT auditing : using controls to protect information assets by
Edition: 2nd ed.
Material type: Text Text
Publication details: Chennai McGraw Hill 2011
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 DAV/I, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 DAV/I.
Lists:

7.
Securing the cloud : cloud computer security techniques and tactics by
Material type: Text Text
Publication details: Waltham, MA Syngress/Elsevier, 2011
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 WIN/S;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 WIN/S.
Lists:

8.
Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem by
Edition: 2nd Ed
Material type: Text Text
Publication details: Birmingham Packt Publishers 2018
Availability: Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 004.678 RUS/P. Not available: IIIT Kottayam Central Library: Checked out (1).
Lists:

9.
Cloud security and privacy An Enterprise Perspective on Risks and Compliance by Series:
Material type: Text Text
Publication details: Mumbai Shroff Publication & Distribution O'Reilly, 2023
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 MAT/C;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 MAT/C.
Lists:

10.
Computer Networks and Internets :With Internet Application by
Edition: 4th Ed.
Material type: Text Text
Publication details: New Delhi Pearson Education 2004
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 004.6 COM/C.

11.
The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory by
Material type: Text Text
Publication details: Indianapolis John wiley& Sons 2014
Other title:
  • Detecting Malware and Threats in Windows, Linux, and Mac Memory
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.8 LIG/A, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 LIG/A. Not available: IIIT Kottayam Central Library: Checked out (1).

12.
Auditing IT Infrastructures for Compliance by Series: Information Systems Security & Assurance Series
Edition: 3rd Ed
Material type: Text Text
Publication details: Newyork Jones&Bartelett Learning 2024
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 JOH/A, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 JOH/A.

13.
Ad Hoc Wireless Networks : Architecture and Protocols by
Material type: Text Text
Publication details: Noida Pearson India Education 2004
Availability: Items available for loan: IIIT Kottayam Central Library (6)Collection, call number: 621.391 MUR/A, ... Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 621.391 MUR/A. Not available: IIIT Kottayam Central Library: Checked out (1).

14.
Computer Fundamentals and Programming in C by
Edition: 2nd Ed.
Material type: Text Text
Publication details: New Delhi Oxford University Press 2016
Availability: Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 005.133 C THA/C.

15.
Fog for 5G and IoT by Series: Wiley Series on Information and Communication Technology
Material type: Text Text
Publication details: Hoboken, USA John Wiley and Sons Inc 2017
Availability: Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 004.678 2 CHI/F.

Pages

IIIT Kottayam Central Library,Valavoor.P.O, Kottayam-686635,Kerala | Phone: 0482-2202104, Mobile: 9961452785| library@iiitkottayam.ac.in