Central Library - Coimbatore

Online Public Access Catalog

Your search returned 103 results.

Not what you expected? Check for suggestions
Sort
Results
41.
The Security Consultants Handbook by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: ITGP ; 2015
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

42.
Amazon cover image
Image from Amazon.com
Cybersecurity and Human Rights in the Age of Cyberveillance by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Rowman & Littlefield Publishers ; 2016
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

43.
Web Application Security Is a Stack How to CYA (Cover Your Apps) Completely by Series: Fundamentals Series
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: ITGP ; 2015
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

44.
Amazon cover image
Image from Amazon.com
Once More Unto the Breach Managing Information Security in an Uncertain World by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: ITGP ; 2015
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

45.
Amazon cover image
Image from Amazon.com
KALI LINUX NETWORK SCANNING COOKBOOK Over 90 Hands-on Recipes Explaining How to Leverage Custom Scripts, and Integrated Tools in Kali Linux to Effectively Master Network Scanning by Series: Quick Answers to Common Problems
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Packt Publishing ; 2014
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

46.
Amazon cover image
Image from Amazon.com
Information Security Breaches Avoidance and Treatment Based on ISO27001 by
Edition: 2nd ed
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: ITGP ; 2014
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

47.
Amazon cover image
Image from Amazon.com
Building Virtual Pentesting Labs for Advanced Penetration Testing Build Intricate Virtual Architecture to Practice Any Penetration Testing Technique Virtually by Series: Community Experience Distilled
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Packt Publishing ; 2014
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

48.
Amazon cover image
Image from Amazon.com
Cyber Security and IT Infrastructure Protection by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Syngress ; 2014
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

49.
Amazon cover image
Image from Amazon.com
Web Penetration Testing with Kali Linux Testing Web Security Is Best Done Through Simulating an Attack. Kali Linux Lets You Do This to Professional Standards and This Is the Book You Need to Be Fully Up-to-speed with This Powerful Open-source Toolkit. by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Packt Publishing ; 2013
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

50.
Amazon cover image
Image from Amazon.com
The Basics of IT Audit Purposes, Processes, and Practical Information by Series: The Basics
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Syngress ; 2014
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

51.
Amazon cover image
Image from Amazon.com
Managing Information Security by
Edition: 2nd edition
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Syngress ; 2014
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

52.
Amazon cover image
Image from Amazon.com
Biohackers The Politics of Open Science by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Pluto Press ; 2013
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

53.
Amazon cover image
Image from Amazon.com
Cyber Crime, Security and Digital Intelligence by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Routledge ; 2013
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

54.
Amazon cover image
Image from Amazon.com
Penetration Testing Protecting Networks and Systems by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: ITGP ; 2012
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

55.
End User Information Security Policy Template by Series: Need to Know Template
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: BrainMass Inc ; 2012
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

56.
Amazon cover image
Image from Amazon.com
SQL Injection Attacks and Defense by
Edition: 2nd ed
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Syngress ; 2012
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

57.
Amazon cover image
Image from Amazon.com
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide Learn to Perform Professional Penetration Testing for Highly-secured Environments with This Intensive Hands-on Guide with This Book and Ebook. by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Packt Publishing ; 2012
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

58.
Amazon cover image
Image from Amazon.com
Mastering Microsoft Forefront UAG 2010 Customization Discover the Secrets to Extending and Customizing Microsoft Forefront Unified Access Gateway with This Book and Ebook by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Packt Publishing ; 2012
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

59.
Amazon cover image
Image from Amazon.com
Document Security by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Charles C Thomas Publisher, Ltd. ; 2007
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

60.
Amazon cover image
Image from Amazon.com
Formal Models and Techniques for Analyzing Security Protocols by Series: Cryptology and Information Security Series
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: IOS Press ; 2011
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

Maintained by : Central Library, Amrita Vishwa Vidyapeetham, Coimbatore

TOTAL VISITORS
website counter