Central Library - Coimbatore

Online Public Access Catalog

Your search returned 338 results.

Not what you expected? Check for suggestions
Sort
Results
21.
Building VPNs : with IPSec and MPLS by
Material type: Text Text
Publication details: New York ; McGraw-Hill ; 2003
Availability: Items available for reference: AMRITA SCHOOL OF ENGINEERING: Not for loan (1)Location, call number: RF30-R4 004.771VPN P31.

22.
Hack attacks encyclopedia : a complete history of hacks, cracks, phreaks and spies overtime by
Material type: Text Text
Publication details: New York ; John Wiley ; 2001
Availability: Items available for reference: AMRITA SCHOOL OF ENGINEERING: Not for loan (1)Location, call number: RF30-R1 004.7.056.53(031) P10.

23.
Amazon cover image
Image from Amazon.com
White-hat security arsenal tackling the threats by
Material type: Text Text
Publication details: New York ; Addison-Wesley ; 2001
Availability: Items available for reference: AMRITA SCHOOL OF ENGINEERING: Not for loan (1)Location, call number: RF29-R4 004.7.056 P14.

24.
Amazon cover image
Image from Amazon.com
Hacking the code : asp.net web application security by
Material type: Text Text
Publication details: Mumbai ; Shroff Publishers ; 2004
Availability: Items available for loan: AMRITA SCHOOL OF ENGINEERING (1)Location, call number: CS5-R4 004.056.53 P40.

25.
Amazon cover image
Image from Amazon.com
Multicast and group security by
Material type: Text Text
Publication details: London ; Artech House ; 2003
Availability: Items available for reference: AMRITA SCHOOL OF ENGINEERING: Not for loan (1)Location, call number: RF30-R4 004.772 P30.

26.
Amazon cover image
Image from Amazon.com
Adaptive security management architecture by
Material type: Text Text
Publication details: Boca Raton ; CRC Press ; 2011
Availability: Items available for reference: AMRITA SCHOOL OF ENGINEERING: Not for loan (1)Location, call number: Transferred to CYS Dept (Project) 004.7.056 Q13.

27.
Amazon cover image
Image from Amazon.com
Cognitive radio networking and security : a game-theoretic view by
Material type: Text Text
Publication details: Delhi ; Cambridge University Press ; 2011
Availability: Items available for reference: AMRITA SCHOOL OF ENGINEERING: Not for loan (1)Location, call number: RF57-R4 621.396.2 Q10.

28.
Amazon cover image
Image from Amazon.com
Monitoring and Protection of Critical Infrastructure by Unmanned Systems by Series: NATO Science for Peace and Security Series, Sub-series D: Information and Communication Security
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: IOS Press ; 2023
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

29.
Amazon cover image
Image from Amazon.com
Microsoft Identity and Access Administrator Exam Guide Implement IAM Solutions with Azure AD, Build an Identity Governance Strategy, and Pass the SC-300 Exam by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Packt Publishing ; 2023
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

30.
Amazon cover image
Image from Amazon.com
Fundamentals of Adopting the NIST Cybersecurity Framework by Series: Create, Protect, and Deliver Digital Business Value Series
Edition: First edition
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: TSO ; 2022
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

31.
Amazon cover image
Image from Amazon.com
AWS Certified Database - Specialty (DBS-C01) Certification Guide A Comprehensive Guide to Becoming an AWS Certified Database Specialist by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Packt Publishing ; 2022
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

32.
Computer Security for Nuclear Security Implementing Guide by Series: IAEA Nuclear Security Series
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: International Atomic Energy Agency ; 2021
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

33.
Computer Security Techniques for Nuclear Facilities Technical Guidence by Series: IAEA Nuclear Security Series
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: International Atomic Energy Agency ; 2021
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

34.
Amazon cover image
Image from Amazon.com
Microsoft Azure Security Technologies Certification and Beyond Gain Practical Skills to Secure Your Azure Environment and Pass the AZ-500 Exam by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Packt Publishing ; 2021
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

35.
Amazon cover image
Image from Amazon.com
Pentesting Industrial Control Systems An Ethical Hackers Guide to Analyzing, Compromising, Mitigating, and Securing Industrial Processes by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Packt Publishing ; 2021
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

36.
Amazon cover image
Image from Amazon.com
Antivirus Bypass Techniques Learn Practical Techniques and Tactics to Combat, Bypass, and Evade Antivirus Software by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Packt Publishing ; 2021
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

37.
Amazon cover image
Image from Amazon.com
A Vulnerable System The History of Information Security in the Computer Age by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Cornell University Press ; 2021
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

38.
Amazon cover image
Image from Amazon.com
Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Packt Publishing ; 2020
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

39.
Amazon cover image
Image from Amazon.com
AWS Penetration Testing Beginners Guide to Hacking AWS with Tools Such As Kali Linux, Metasploit, and Nmap by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Packt Publishing ; 2020
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

40.
Amazon cover image
Image from Amazon.com
Computer Security and Encryption An Introduction by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Mercury Learning & Information ; 2020
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

Maintained by : Central Library, Amrita Vishwa Vidyapeetham, Coimbatore

TOTAL VISITORS
website counter