Your search returned 19 results.

Sort
Results
1.
Cyber laws : intellectual property and E-commerce security. edited by Krishna Kumar. by
  • Kumar, Krishna
Material type: Text Text
Publication details: New Delhi. Dominant Publishers. 2001
Availability: Items available for loan: North Eastern Hill University (1)Call number: 341.758 CYB.
2.
Information assurance : Managing organizational it security risks Joseph G. Boyce and Dan W. Jennings by
  • Boyce,J.G
  • Jennings Dan W
Material type: Text Text
Publication details: Amsterdam Butterworth Heinemann 2002
Availability: Items available for loan: North Eastern Hill University (1)Call number: 001.642 BOY.
3.
Handbook of information security management by Sumit K Tukral by
  • Tukral, Sumit K
Material type: Text Text
Publication details: Delhi Author's Press [19-?]
Availability: Items available for loan: North Eastern Hill University (1)Call number: 001.5 TUK.
4.
Fundamentals of computer security Josef Pieprzyk, Thomas Hardjono and Jennifer Seberry by
  • Pieprzyk, Josef
  • Hardjono, Thomas
  • Seberry, Jennifer
Material type: Text Text
Publication details: New York Springer 2003
Availability: Items available for loan: North Eastern Hill University (1)Call number: 001.64404 PIE.
5.
Elliptic curves in cryptography by I.F. Blake, G. Seroussi ,N. P. Smart by
  • Blake, I.F
  • Seroussi ,G
  • Smart ,N. P
Series: London mathematical society lecture notes;no.265
Material type: Text Text
Publication details: Cambridge Cambridge University Press c1999
Availability: Items available for loan: North Eastern Hill University (1)Call number: 001.5436 BLA.
6.
Introduction to computer security Matt Bishop and Sathyanatayana S.Venkatramanayya by
  • Bishop, Matt
  • Venkatramanayya, Sathyanarayana S
Material type: Text Text
Publication details: New Delhi Dorling Kindersley 2011
Availability: Items available for loan: North Eastern Hill University (2)Call number: 005.8 BIS , ...
7.
Cryptography and network security by Behrouz A.Forouzan and Debdeep Mukhopaddhyay by
  • Forouzan, Behrouz A
  • Mukhopadhyay, Debdeep
Edition: 2nd ed.
Material type: Text Text
Publication details: New Delhi Tata Mcgraw hill 2010
Availability: Items available for loan: North Eastern Hill University (9)Call number: 005.82 FOR , ... Not available: North Eastern Hill University: Checked out (3).
8.
Cryptography : an introduction edited by V.V. Yaschenko by
  • Yaschenko, V. V
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hyderabad American Mathematical Society 2002
Availability: Items available for loan: North Eastern Hill University (1)Call number: 005.82 .
9.
Cybercrimes Talat Fatima by
  • Fatima, Talat
Material type: Text Text
Publication details: Lucknow Eastern Book Company 2011
Availability: Items available for loan: North Eastern Hill University (3)Call number: 343.540999 FAT , ... Not available: North Eastern Hill University: Checked out (1).
10.
Security in computing Charles P. Pfleeger, Shari Lawrence Pfleeger and Deven Shah by
  • Pfleeger, Charles P
  • Pfleeger, Shari Lawrence Shah, Deven
Edition: 4th ed.
Material type: Text Text
Publication details: New Delhi Person Prentice Hall 2011
Availability: Items available for loan: North Eastern Hill University (4)Call number: 005.8 , ...
11.
Ethical guide to hacking mobile phones by Ankit Fadia by
  • Fadia, Ankit
Series: Ethical hacking series
Material type: Text Text
Publication details: New Delhi Macmillan 2011
Availability: Items available for loan: North Eastern Hill University (3)Call number: 008.5 FAD, ...
12.
Introduction to cryptography with open-source software Alasdair McAndrew by
  • McAndrew, Alasdair
Series: Discrete mathematics and its applications
Material type: Text Text
Publication details: New York CRC Press 2011
Availability: Items available for loan: North Eastern Hill University (1)Call number: 005.82 MCA.
13.
Ethical hacking guide to corporate security Ankit Fadia by
  • Fadia, Ankit
Material type: Text Text
Publication details: Delhi Macmillan Publishers 2004
Availability: Items available for loan: North Eastern Hill University (5)Call number: 005.8 FAD, ...
14.
RC4 stream cipher and its variants Goutam Paul and Subhamoy Maitra by
  • Paul, Goutam
  • Maitra, Subhamoy
Series: Discrete mathematics and its applications
Material type: Text Text
Publication details: London CRC Press 2012
Availability: Items available for loan: North Eastern Hill University (1)Call number: 005.8 PAU.
15.
Hadoop security Ben Spivey and Joey Echeverria by
  • Spivey, Ben
  • Echeverria, Joey
Material type: Text Text
Publication details: Mumbai Shroff Publishers 2015
Availability: Items available for loan: North Eastern Hill University (2)Call number: 005.74 SPI, ...
16. Books
Software hacking Ankit Fadia and Nishant Das Patnaik by
  • Fadia, Ankit
  • Patnaik, Nishant Das
Material type: Text Text
Language: English
Publication details: Mumbai Vikas Publishing House Pvt Ltd 2008
Availability: Items available for loan: North Eastern Hill University (1)Call number: 005.8 FAD.
17. Books
Androidâ„¢ hacker's handbook Joshua J. Drake [et al...] by
  • Drake, Joshua J
  • Fora., Pau Oliva
  • Lanier, Zach
  • Mulliner, Collin
  • Ridley, Stephen A
  • Wicherski, Georg
Material type: Text Text
Language: English
Publication details: New Delhi John Wiley & Sons 2015
Availability: Items available for loan: North Eastern Hill University (2)Call number: 005.8 AND, ...
18. Books
Web application hacker's handbook : finding and exploiting security flaws Dafydd Stuttard and Marcus Pinto by
  • Stuttard, Dafydd
  • Pinto, Marcus
Edition: 2nd ed.
Material type: Text Text
Language: English
Publication details: New Delhi Wiley 2011
Availability: Items available for loan: North Eastern Hill University (2)Call number: 005.8 STU, ...
19. E-Books
Computational network science : an algorithmic approach / Henry Hexmoor. by
  • Hexmoor, Henry
Series:
Material type: Text Text
Availability: Items available for loan: North Eastern Hill University (1)Call number: 005.8.
Pages

Powered by Koha