Welcome to NEHU Central Library, Shillong

Online Public Access Catalogue (OPAC)

Your search returned 20 results.

Sort
Results
1.
Cyber laws : intellectual property and E-commerce security. edited by Krishna Kumar. by
Material type: Text Text
Publication details: New Delhi. Dominant Publishers. 2001
Availability: Items available for loan: North Eastern Hill University (1)Call number: 341.758 CYB.
2.
Information assurance : Managing organizational it security risks Joseph G. Boyce and Dan W. Jennings by
Material type: Text Text
Publication details: Amsterdam Butterworth Heinemann 2002
Availability: Items available for loan: North Eastern Hill University (1)Call number: 001.642 BOY.
3.
Handbook of information security management by Sumit K Tukral by
Material type: Text Text
Publication details: Delhi Author's Press [19-?]
Availability: Items available for loan: North Eastern Hill University (1)Call number: 001.5 TUK.
4.
Fundamentals of computer security Josef Pieprzyk, Thomas Hardjono and Jennifer Seberry by
Material type: Text Text
Publication details: New York Springer 2003
Availability: Items available for loan: North Eastern Hill University (1)Call number: 001.64404 PIE.
5.
Elliptic curves in cryptography by I.F. Blake, G. Seroussi ,N. P. Smart by Series: London mathematical society lecture notes;no.265
Material type: Text Text
Publication details: Cambridge Cambridge University Press c1999
Availability: Items available for loan: North Eastern Hill University (1)Call number: 001.5436 BLA.
6.
Introduction to computer security Matt Bishop and Sathyanatayana S.Venkatramanayya by
Material type: Text Text
Publication details: New Delhi Dorling Kindersley 2011
Online resources:
Availability: Items available for loan: North Eastern Hill University (2)Call number: 005.8 BIS , ...
7.
Cryptography and network security by Behrouz A.Forouzan and Debdeep Mukhopaddhyay by
Edition: 2nd ed.
Material type: Text Text
Publication details: New Delhi Tata Mcgraw hill 2010
Availability: Items available for loan: North Eastern Hill University (12)Call number: 005.82 FOR , ...
8. Books
Cryptography : an introduction edited by V. V. Yaschenko by Series: Student Mathematical Library ; v.18
Material type: Text Text
Publication details: Hyderabad American Mathematical Society 2002
Online resources:
Availability: Items available for loan: North Eastern Hill University (2)Call number: 005.82 CRY , ...
9.
Cybercrimes Talat Fatima by
Material type: Text Text
Publication details: Lucknow Eastern Book Company 2011
Availability: Items available for loan: North Eastern Hill University (1)Call number: 343.540999 FAT . Not available: North Eastern Hill University: Checked out (3).
10.
Security in computing Charles P. Pfleeger, Shari Lawrence Pfleeger and Deven Shah by
Edition: 4th ed.
Material type: Text Text
Publication details: New Delhi Person Prentice Hall 2011
Online resources:
Availability: Items available for loan: North Eastern Hill University (4)Call number: 005.8 , ...
11.
Ethical guide to hacking mobile phones by Ankit Fadia by Series: Ethical hacking series
Material type: Text Text
Publication details: New Delhi Macmillan 2011
Availability: Items available for loan: North Eastern Hill University (3)Call number: 008.5 FAD, ...
12.
Introduction to cryptography with open-source software Alasdair McAndrew by Series: Discrete mathematics and its applications
Material type: Text Text
Publication details: New York CRC Press 2011
Online resources:
Availability: Items available for loan: North Eastern Hill University (1)Call number: 005.82 MCA.
13.
Ethical hacking guide to corporate security Ankit Fadia by
Material type: Text Text
Publication details: Delhi Macmillan Publishers 2004
Availability: Items available for loan: North Eastern Hill University (5)Call number: 005.8 FAD, ...
14.
RC4 stream cipher and its variants Goutam Paul and Subhamoy Maitra by Series: Discrete mathematics and its applications
Material type: Text Text
Publication details: London CRC Press 2012
Online resources:
Availability: Items available for loan: North Eastern Hill University (1)Call number: 005.8 PAU.
15.
Hadoop security Ben Spivey and Joey Echeverria by
Material type: Text Text
Publication details: Mumbai Shroff Publishers 2015
Availability: Items available for loan: North Eastern Hill University (2)Call number: 005.74 SPI, ...
16. Books
Software hacking Ankit Fadia and Nishant Das Patnaik by
Material type: Text Text
Language: English
Publication details: Mumbai Vikas Publishing House Pvt Ltd 2008
Online resources:
Availability: Items available for loan: North Eastern Hill University (1)Call number: 005.8 FAD.
17. Books
Android™ hacker's handbook Joshua J. Drake [et al...] by
Material type: Text Text
Language: English
Publication details: New Delhi John Wiley & Sons 2015
Availability: Items available for loan: North Eastern Hill University (2)Call number: 005.8 AND, ...
18. Books
Web application hacker's handbook : finding and exploiting security flaws Dafydd Stuttard and Marcus Pinto by
Edition: 2nd ed.
Material type: Text Text
Language: English
Publication details: New Delhi Wiley 2011
Online resources:
Availability: Items available for loan: North Eastern Hill University (2)Call number: 005.8 STU, ...
19. E-Books
Computational network science : an algorithmic approach / Henry Hexmoor. by Series:
Material type: Text Text
Online resources:
Availability: Items available for loan: North Eastern Hill University (1)Call number: 005.8.
20. Thesis
Designing a bio-inspired method of response in intrusion detection system by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Shillong Department of Information Technology, NEHU 2017
Dissertation note: Ph.D
Availability: Items available for reference: North Eastern Hill University: Not for loan (2)Call number: DS 005.8 SHA, ...