Central Library - Coimbatore

Online Public Access Catalog

Your search returned 22 results.

Not what you expected? Check for suggestions
Sort
Results
1.
Amazon cover image
Image from Amazon.com
Hack attacks revealed : a complete reference for unix, windows and linux with custom security toolkit [with cd-rom] by
Edition: 2
Material type: Text Text
Publication details: New Delhi ; Wiley-Dreamtech ; 2002
Availability: Items available for loan: AMRITA SCHOOL OF ENGINEERING (2)Location, call number: CS5-R4 004.056.53 P20, ...

2.
Security in distributed computing did you lock the door by
Material type: Text Text
Publication details: New Jersey ; Prentice-Hall ; 1997
Availability: Items available for reference: AMRITA SCHOOL OF ENGINEERING: Not for loan (1)Location, call number: RF29-R4 004.7.056 N71.

3.
Amazon cover image
Image from Amazon.com
Security patterns : integrating security and systems engineering by
Material type: Text Text
Publication details: New Delhi ; John Wiley ; 2006
Availability: Items available for loan: AMRITA SCHOOL OF ENGINEERING (2)Location, call number: CS90-R1 004.7.056 P68, ...

4.
Amazon cover image
Image from Amazon.com
The software vulnerability guide by
Material type: Text Text
Publication details: New Delhi ; Firewall Media ; 2007
Availability: Items available for loan: AMRITA SCHOOL OF ENGINEERING (1)Location, call number: CS19-R2 004.4.056 P70.

5.
Amazon cover image
Image from Amazon.com
Cryptography and network security by
Material type: Text Text
Publication details: Pune ; Technical ; 2007
Availability: Items available for loan: AMRITA SCHOOL OF ENGINEERING (1)Location, call number: CS91-R3 004.7.056.55 P70.

6.
Amazon cover image
Image from Amazon.com
Introduction to network security [with cd - rom] by
Material type: Text Text
Publication details: Massachusetts ; Charles River Media ; 2007
Availability: Items available for loan: AMRITA SCHOOL OF ENGINEERING (1)Location, call number: Transferred to CYS Dept (Project) 004.7.056 P78.

7.
Amazon cover image
Image from Amazon.com
Networks, security and soft computing : trends and future directions by
Material type: Text Text
Publication details: New Delhi ; Narosa Publishing ; 2007
Availability: Items available for loan: AMRITA SCHOOL OF ENGINEERING (3)Location, call number: Transferred to CYS Dept (Project) 681.392 P76, ...

8.
Cryptography and network security by
Material type: Text Text
Publication details: New Delhi ; Tata McGraw-Hill ; 2008
Availability: Items available for loan: AMRITA SCHOOL OF ENGINEERING (1)Location, call number: CS91-R3 004.7.056.55 P8;1.

9.
Amazon cover image
Image from Amazon.com
Software vulnerability guide by
Material type: Text Text
Publication details: Chennai ; Firewall Media ; 2007
Availability: Items available for loan: AMRITA SCHOOL OF ENGINEERING (1)Location, call number: CS19-R2 004.4.056 P70;1.

10.
Amazon cover image
Image from Amazon.com
Computer security in the 21st century by
Material type: Text Text
Publication details: New Delhi ; Springer ; 2005
Availability: Items available for loan: AMRITA SCHOOL OF ENGINEERING (2)Location, call number: Transferred to CYS Dept (Project) 681.392 P592, ...

11.
Amazon cover image
Image from Amazon.com
Machine learning and data mining for computer security : methods and applications by
Material type: Text Text
Publication details: London ; Springer ; 2006
Availability: Items available for loan: AMRITA SCHOOL OF ENGINEERING (1)Location, call number: Transferred to CYS Dept (Project) 681.392 P6992.

12.
Art of software security testing : identifying software security flaws by
Material type: Text Text
Publication details: New York ; Addison - Wesley ; 2007
Availability: Items available for loan: AMRITA SCHOOL OF ENGINEERING (1)Location, call number: Transferred to CYS Dept (Project) 681.392 P798.

13.
Amazon cover image
Image from Amazon.com
Network security : know it all by
Material type: Text Text
Publication details: New York ; Elsevier ; 2008
Availability: Items available for loan: AMRITA SCHOOL OF ENGINEERING (1)Location, call number: Transferred to CYS Dept (Project) 681.392 P86.

14.
Amazon cover image
Image from Amazon.com
Classical introduction to cryptography : applications for communications security by
Material type: Text Text
Publication details: New Delhi ; Springer ; 2006
Availability: Items available for loan: AMRITA SCHOOL OF ENGINEERING (2)Location, call number: CS91-R3 004.7.056.55 P62, ...

15.
Amazon cover image
Image from Amazon.com
Cryptography : an introduction by
Material type: Text Text
Publication details: Hyderabad ; Universities Press ; 2002
Availability: Items available for loan: AMRITA SCHOOL OF ENGINEERING (1)Location, call number: Transferred to CYS Dept (Project) 681.392 P293.

16.
Amazon cover image
Image from Amazon.com
Introduction to modern cryptography by Series: Cryptography and network security
Material type: Text Text
Publication details: Boca Raton ; Taylor & Francis ; 2008
Availability: Items available for loan: AMRITA SCHOOL OF ENGINEERING (1)Location, call number: Transferred to CYS Dept (Project) 681.392 P891.

17.
Amazon cover image
Image from Amazon.com
Cryptography and network security : principles and practice by
Edition: 5
Material type: Text Text
Publication details: New Delhi ; Pearson Education ; 2011
Availability: Items available for loan: AMRITA SCHOOL OF ENGINEERING (2)Location, call number: CS91-R1 004.7.056.55 P00;Q1;4, ... Items available for reference: AMRITA SCHOOL OF ENGINEERING: Not for loan (1)Location, call number: Transferred to CYS Dept (Project) 681.392P0;Q1. Not available: AMRITA SCHOOL OF ENGINEERING: Checked out (1).

18.
Amazon cover image
Image from Amazon.com
Incident Response in the Age of Cloud Techniques and Best Practices to Effectively Respond to Cybersecurity Incidents by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Packt Publishing ; 2021
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

19.
Amazon cover image
Image from Amazon.com
Mastering Linux Security and Hardening Secure Your Linux Server and Protect It From Intruders, Malware Attacks, and Other External Threats by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Packt Publishing ; 2018
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

20.
Amazon cover image
Image from Amazon.com
The Complete Guide to Healthcare Privacy and Information Security Governance by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: HCPro, a division of BLR ; 2014
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

Maintained by : Central Library, Amrita Vishwa Vidyapeetham, Coimbatore

TOTAL VISITORS
website counter