|
The Unicorn Project :A novel about developers, digital disruption, and thriving in the age of data by
Material type: Text
Publication details: Portland IT Revolution 2019
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 823 KIM/T.
|
|
Practical Mobile Forensics by
Edition: 4th ed.
Material type: Text
Publication details: Birmingham,UK Packt Publishing 2020
Other title: - Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devices
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 621.384 56 TAM/P, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 621.384 56 TAM/P. Not available: IIIT Kottayam Central Library: Checked out (1).
|
|
Introduction to Classical and Quantum Computing by
Material type: Text
Publication details: Omaha Rooted Grove 2022
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 006.38 WON/I, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 006.38 WON/I. Not available: IIIT Kottayam Central Library: Checked out (1).
|
|
The Boston Consulting Group on Strategy by
Edition: 2nd ed.
Material type: Text
Publication details: New Jersey John Wiley & Sons, c2006
Availability: Items available for loan: IIIT Kottayam Central Library (1)Collection, call number: 658.401 2 STE/B.
|
|
Introduction to Graph Theory by
Material type: Text
Publication details: Karachi PMA Publishing 2015
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 511.5 TRU/I, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 511.5 TRU/I.
|
|
Guide to Computer Forensics and Investigations by
Edition: 6th Ed.
Material type: Text
Publication details: New Delhi Cengage Learning 2019
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 NEL/G, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 NEL/G.
|
|
Distributed Systems Security :Issues, Processes and Solutions by
Material type: Text
Publication details: New Jersey John Wiley & Sons, 2009
Availability: Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 BEL/D.
|
|
Social Network Analysis by
Material type: Text
Publication details: New Delhi Wiley India 2021
Availability: Items available for loan: IIIT Kottayam Central Library (2)Collection, call number: 004.6 CHA/S, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 004.6 CHA/S. IIIT Kottayam Central Library: Not for loan (1).
|
|
The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory by
Material type: Text
Publication details: Indianapolis John wiley& Sons 2014
Other title: - Detecting Malware and Threats in Windows, Linux, and Mac Memory
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.8 LIG/A, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 LIG/A. Not available: IIIT Kottayam Central Library: Checked out (1).
|
|
Advances in Financial Machine Learning by
Material type: Text
Publication details: New Jersey John Wiley& Sons 2018
Availability: Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 006.31 PRA/A.
|
|
Ethical Hacker's Penetration Testing Guide by
Material type: Text
Availability: Items available for loan: IIIT Kottayam Central Library (6)Collection, call number: 005.87 RAK/E, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.87 RAK/E. Not available: IIIT Kottayam Central Library: Checked out (3).
|
|
Introductory Techniques for 3-D Computer Vision by
Material type: Text
Publication details: New Jersey Prentice Hall, ©1998
Availability: Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 006.37 TRU/I. Not available: IIIT Kottayam Central Library: Checked out (1).
|
|
Social Engineering : The Science of Human Hacking by
Edition: 2nd edition.
Material type: Text
Publication details: Indianapolis John wiley & Sons 2018
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.8 HAD/S, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 HAD/S. Not available: IIIT Kottayam Central Library: Checked out (1).
|
|
Random Processes : First-Passage and Escape by
Material type: Text
Publication details: Singapore World Scientific 2018
Availability: Items available for reference: IIIT Kottayam Central Library: Not For Loan (2)Collection, call number: 519.23 MAS/R, ...
|
|
Dancing With Qubits: How Quantum Computing works and how it can change the world by
Material type: Text
Publication details: Mumbai Packt Publishing 2019
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 006.384 3 SUT/D, ... Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 006.384 3 SUT/D.
|
|
Python All-in-One for Dummies by
Material type: Text
Publication details: New Delhi Wiley India 2023
Availability: Items available for reference: IIIT Kottayam Central Library: Not for loan (1)Collection, call number: 005.133 P SHO/P.
|
|
Cryptography and Network Security : Principles and Practice by
Edition: 8th Ed.
Material type: Text
Publication details: Noida Pearson India Education 2024
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.8 STA/C, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 STA/C. Not available: IIIT Kottayam Central Library: Checked out (1).
|
|
Fuzzy Graphs and Fuzzy Hypergraphs by
Material type: Text
Publication details: New York : Physica-Verlag, 2000
Availability: Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 511.5 MOR/F.
|
|
Metasploit :The Penetration Tester's Guide by
Material type: Text
Publication details: San Francisco No Starch Press 2011
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.87 KEN/M , ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: Reference 005.87 KEN/M. Not available: IIIT Kottayam Central Library: Checked out (1).
|
|
Expert Fraud Investigation : A Step-by-Step Guide by
Material type: Text
Publication details: New Jersey John Wiley & Sons, c2009
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 COE/E, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 COE/E.
|