Welcome to LNMIIT Central Library
Online Public Access Catalogue

Refine your search

Your search returned 127 results.

Sort
Results
61.
Introduction to machine learning with applications in information security Mark Stamp by Series: Chapman & Hall/CRC machine learning & Pattern recognition series | Herbrich, Ralf
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Press 2018
Availability: Items available for loan: Central Library (1)Call number: 004.6 St234i.

62.
Trusted computing principles and applications Dengguo Feng by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Berlin De Gruyter 2018
Availability: Items available for loan: Central Library (1)Call number: 004 F3561t.

63.
Fundamentals of information systems security David Kim by Series: Information Systems Security & Assurance Series
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Burlington Jones & Bartlett Learning 2018
Availability: Items available for loan: Central Library (1)Call number: 005.8 K5601f3.

64.
Elementary information security Richard E. Smith by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Burlington Jones & Bartlett Learning 2016
Availability: Items available for loan: Central Library (1)Call number: 005.8 Sm511e2.

65.
Understanding cryptography a textbook for students and practitioners Christof Paar by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Berlin Springer 2010
Availability: Items available for loan: Central Library (1)Call number: 005.82 P111u.

66.
Intelligence-driven incident response outwitting the adversary Scott J. Roberts by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Mumbai Shroff Publishers & Distributors Pvt. Ltd. 2017
Availability: Items available for loan: Central Library (1)Call number: 005.8 R5411i.

67.
Data mining and machine learning in cybersecurity Sumeet Dua by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Press 2011
Availability: Items available for loan: Central Library (1)Call number: 005.8 D85d.

68.
Cryptography and network security Behrouz A Forouzan by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Chennai McGraw Hill Education (India) Private Limited 2015
Availability: Items available for loan: Central Library (1)Call number: 005.8 F769c3.

69.
Practical internet of things security Brian Russell by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Mumbai Packet Publishing 2016
Availability: Items available for loan: Central Library (1)Call number: 005.8 R911p.

70.
Kali linux wireless penetration testing beginners guide; Master wireless testing techniques to survey and attack wireless networks with Kali Linux Vivek Ramachandran by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Mumbai Packt Publishing 2015
Availability: Items available for loan: Central Library (1)Call number: 005.8 R1406k.

71.
Mastering Metasploit take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit Nipun Jaswal by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Mumbai Packt Publishing 2016
Availability: Items available for loan: Central Library (1)Call number: 005.8 J316m2.

72.
Intrusion alert an ethical hacking guide to intrusion detection Ankit Fadia by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Vikas Publishing House Pvt. Ltd. 2007
Availability: No items available.

73.
Computer security Dieter Gollmann by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Wiley 2011
Availability: Items available for loan: Central Library (1)Call number: 005.8 G582c3.

74.
Cyber security policy guidebook Jennifer L. Bayuk...[et al.] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Wiley 2012
Availability: Items available for loan: Central Library (1)Call number: 005.8 B345c.

75.
Applied algebra codes, ciphers, and discrete algorithms Darel W. Hardy by Series: Discrete Mathematics and its Applications | Rosen, Kenneth H
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Press 2009
Availability: Items available for loan: Central Library (1)Call number: 003.54 H2222a2.

76.
Boolean functions and their applications in cryptography Chuan-Kun Wu by Series: Advances in Computer Science and Technology | Feng, Dengguo
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Heidelberg Springer 2016
Availability: Not available: Central Library: Checked out (1).

77.
Internet of things security fundamentals, techniques and applications Shishir Kumar Shandilya by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Denmark River Publishers 2018
Availability: Items available for loan: Central Library (1)Call number: 005.8 Sh183i.

78.
Computer security principles and practice William Stallings by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New York Pearson 2018
Availability: Items available for loan: Central Library (1)Call number: 005.8 St18c4.
  (1 votes)
79.
Disruptive possibilities: how big data changes everything by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai : Shroff Publishers, 2013
Availability: Items available for loan: Central Library (1)Call number: 006.312 N2891d.

80.
Privacy and big data: the players, regulators, and stakeholders by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai : Shroff Publishers, 2011
Availability: Items available for loan: Central Library (1)Call number: 005.265 C8441p.

Designed & Maintained by: Central Library, LNMIIT, Jaipur