Welcome to LNMIIT Central Library
Online Public Access Catalogue

Refine your search

Your search returned 232 results.

Sort
Results
141.
Embedded Systems Security David Kleidermacher [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Oxford : Newnes, 2012
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 K6721e.

142.
Wireless Reconnaissance in Penetration Testing by Matthew Neely, Alex Hamerstone and Chris Sanyk [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, 2013
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 621.38928 N293w.

143.
Hacking and Penetration Testing with Low Power Devices by Philip Polstra [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, 2015
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 P7678h.

144.
Information Security Analytics by Mark Talabis, Robert McPherson, I Miyamoto and Jason Martin [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, 2015
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 T14i.

145.
Managing Information Security (Second Edition) by John R. Vacca (Ed.) [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, 2014
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 V132m2.

146.
Network and System Security (Second Edition) by John R. Vacca (Ed.) [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, 2014
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 V132m2.

147.
Metrics and Methods for Security Risk Management by Carl S. Young [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, 2010
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 658.47 Y841m.

148.
Cyber Attacks by Edward Amoroso (Ed.) [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Oxford : Butterworth-Heinemann, 2011
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 363.32593843 Am68c.

149.
Handbook on Securing Cyber-Physical Critical Infrastructure by Sajal K. Das, Krishna Kant and Nan Zhang [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Morgan Kaufmann, 2012
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 D2601h.

150.
Data Hiding by Michael Raggo [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, 2013
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 R1266d.

151.
Trust management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012 Surat, India, May 21-25, 2012, proceedings by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London Springer 2012
Availability: Items available for loan: Central Library (1)Call number: 005.8 D594t.

152.
Information security and cyber laws Sarika Gupta by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Khanna Book Publishing Co. (P) Ltd. 2013
Availability: Items available for loan: Central Library (1)Call number: 005.8 G9592i.

153.
Cybersecurity ops with bash attack, defend, and analyze from the command line Paul Troncone by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Mumbai Shroff Publishers & Distributors Pvt. Ltd. 2019
Availability: Items available for loan: Central Library (1)Call number: 005.8 T752c.

154.
Web security testing cookbook systematic techniques to find problems fast Paco Hope by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Mumbai Shroff Publishers & Distributors Pvt. Ltd. 2009
Availability: Items available for loan: Central Library (1)Call number: 005.14 H771w.

155.
National security challenges young scholars' perspective Colonel Ramandeep Singh Sandhu by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Pentagon Press LLP 2020
Availability: Items available for loan: Central Library (1)Call number: 355.033054 Sa568n.

156.
Cryptography and network security principles and practice William Stallings by
Edition: 7th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Noida Pearson 2017
Availability: Items available for loan: Central Library (1)Call number: 005.82 St18c7.

157.
MPLS VPN security Michael H. Behringer by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Argentina Pearson 2005
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 B396m.

158.
Internet of things security challenges, advances, and analytics by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Press 2019
Availability: Items available for loan: Central Library (1)Call number: 005.8 C4419i.

159.
Information hiding techniques for steganography and digital watermarking Stefan Katzenbeisser by Series: Computer Security Series | Oppliger, Rolf
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Boston Artech House 2000
Availability: Items available for loan: Central Library (1)Call number: 005.8 K1598i.

160.
Disappearing cryptography information hiding : steganography & watermarking Peter Wayner by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Amsterdam Morgan Kaufmann Publishers 2009
Availability: Items available for loan: Central Library (1)Call number: 005.82 W367d3.

Designed & Maintained by: Central Library, LNMIIT, Jaipur