Results
|
1.
|
Ethical Haching and Penetration Testing Guide by
Material type: Text
Publication details: Boca Raton CRC Press 2025
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 005.87 BAL/E;1. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.87 BAL/E.
|
|
2.
|
The basics of IT audit : purposes, processes, and practical information by
Material type: Text
Publication details: Waltham Elsevier c2014
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 GAN/T;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 GAN/T.
|
|
3.
|
Risk management for security professionals Carl A. Roper. by
Material type: Text
Publication details: Boston : Butterworth-Heinemann, 2010
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 658.47 ROP/R;1. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 658.47 ROP/R.
|
|
4.
|
Applied network security monitoring : collection, detection, and analysis by
Material type: Text
Publication details: USA Elsevier 2014
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 SAN/A;1, ... Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 005.8 SAN/A.
|
|
5.
|
|
|
6.
|
Handbook of database security : applications and trends by
Material type: Text
Publication details: New Delhi Springer, 2023
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 005.8 GER/H;1. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 GER/H.
|
|
7.
|
IT auditing : using controls to protect information assets by
Edition: 2nd ed.
Material type: Text
Publication details: Chennai McGraw Hill 2011
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 DAV/I, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 DAV/I.
|
|
8.
|
Network security : private communications in a public world by
Edition: 3rd ED
Material type: Text
Publication details: Noida Pearson Education 2024
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 005.8 KAU/N;1. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 KAU/N. Not available: IIIT Kottayam Central Library: Checked out (1).
|
|
9.
|
Securing the cloud : cloud computer security techniques and tactics by
Material type: Text
Publication details: Waltham, MA Syngress/Elsevier, 2011
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 WIN/S;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 WIN/S.
|
|
10.
|
Network security essentials : applications and standards by
Edition: 6th ed
Material type: Text
Publication details: Noida Pearson Education 2023
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 005.8 STA/N;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 STA/N.
|
|
11.
|
|
|
12.
|
Machine learning and security : protecting systems with data and algorithms by
Edition: First edition.
Material type: Text
Publication details: Mumbai Shroff Publishers & Distributors 2024
Other title: - Machine learning & security : protecting systems with data and algorithms
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 006.31 CHI/M;1. Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 006.31 CHI/M. Not available: IIIT Kottayam Central Library: Checked out (1).
|
|
13.
|
|
|
14.
|
|
|
15.
|
Digital watermarking and steganography / by
Edition: 2nd ed.
Material type: Text
Publication details: Amsterdam ; Boston : Morgan Kaufmann Publishers, c2008
Availability: Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 COX/D. IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 005.8 COX/D.
|
|
16.
|
Guidelines on Security and Privacy in Public Cloud Computing by Series:
Material type: Text
Publication details: Gaithersburg NIST Special Publications c2011
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 004.6782 JAN/G;1, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 004.6782 JAN/G.
|
|
17.
|
|
|
18.
|
|
|
19.
|
|
|
20.
|
Managing Risk in Information Systems by Series: Information Systems Security & Assurance Series
Edition: 3rd
Material type: Text
Publication details: Burlington Jones & Bartlett Learning 2022
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.8 GIB/M;1, ... Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 005.8 GIB/M.
|