Welcome to LNMIIT Central Library
Online Public Access Catalogue

Refine your search

Your search returned 232 results.

Sort
Results
121.
Practical internet of things security Brian Russell by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Mumbai Packet Publishing 2016
Availability: Items available for loan: Central Library (1)Call number: 005.8 R911p.

122.
Kali linux wireless penetration testing beginners guide; Master wireless testing techniques to survey and attack wireless networks with Kali Linux Vivek Ramachandran by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Mumbai Packt Publishing 2015
Availability: Items available for loan: Central Library (1)Call number: 005.8 R1406k.

123.
Mastering Metasploit take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit Nipun Jaswal by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Mumbai Packt Publishing 2016
Availability: Items available for loan: Central Library (1)Call number: 005.8 J316m2.

124.
Intrusion alert an ethical hacking guide to intrusion detection Ankit Fadia by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Vikas Publishing House Pvt. Ltd. 2007
Availability: No items available.

125.
Computer security Dieter Gollmann by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Wiley 2011
Availability: Items available for loan: Central Library (1)Call number: 005.8 G582c3.

126.
Indian economy issues and concerns K. R. Gupta by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Atlantic Publishers & Distributors (P) Ltd 2018
Availability: Items available for loan: Central Library (1)Call number: 330.954 G9592i.

127.
Politics of food security in India M. Raghavan by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Atlantic Publishers & Distributors (P) Ltd 2019
Availability: Items available for loan: Central Library (1)Call number: 338.1954 R1266p.

128.
Cyber security policy guidebook Jennifer L. Bayuk...[et al.] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Wiley 2012
Availability: Items available for loan: Central Library (1)Call number: 005.8 B345c.

129.
Cyber security understanding cyber crimes, computer forensics and legal perspectives Nina Godbole by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Wiley 2011
Availability: Items available for loan: Central Library (1)Call number: 005.8 G5412c.

130.
Applied algebra codes, ciphers, and discrete algorithms Darel W. Hardy by Series: Discrete Mathematics and its Applications | Rosen, Kenneth H
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Press 2009
Availability: Items available for loan: Central Library (1)Call number: 003.54 H2222a2.

131.
Click here to kill everybody security and survival in a hyper-connected world Bruce Schneier by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New York W. W. Norton & Company 2018
Availability: Items available for loan: Central Library (1)Call number: 005.8 Sch588c.

132.
Boolean functions and their applications in cryptography Chuan-Kun Wu by Series: Advances in Computer Science and Technology | Feng, Dengguo
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Heidelberg Springer 2016
Availability: Not available: Central Library: Checked out (1).

133.
Internet of things security fundamentals, techniques and applications Shishir Kumar Shandilya by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Denmark River Publishers 2018
Availability: Items available for loan: Central Library (1)Call number: 005.8 Sh183i.

134.
Computer security principles and practice William Stallings by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New York Pearson 2018
Availability: Items available for loan: Central Library (1)Call number: 005.8 St18c4.
  (1 votes)
135.
Disruptive possibilities: how big data changes everything by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai : Shroff Publishers, 2013
Availability: Items available for loan: Central Library (1)Call number: 006.312 N2891d.

136.
Practical cloud security: a guide for secure design and deployment by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai : Shroff Publishers, 2019
Availability: Items available for loan: Central Library (1)Call number: 004.6782 D7425p .

137.
Privacy and big data: the players, regulators, and stakeholders by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai : Shroff Publishers, 2011
Availability: Items available for loan: Central Library (1)Call number: 005.265 C8441p.

138.
A Guide to Kernel Exploitation by Enrico Perla and Massimiliano Oldani [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, 2011
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 P42g.

139.
The Basics of Digital Privacy by Denny Cherry [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, 2014
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 C4243b.

140.
How to Define and Build an Effective Cyber Threat Intelligence Capability by Max Dalziel [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, 2015
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 D179h.

Designed & Maintained by: Central Library, LNMIIT, Jaipur