Welcome to LNMIIT Central Library
Online Public Access Catalogue

Refine your search

Your search returned 127 results.

Sort
Results
81.
A Guide to Kernel Exploitation by Enrico Perla and Massimiliano Oldani [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, 2011
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 P42g.

82.
The Basics of Digital Privacy by Denny Cherry [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, 2014
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 C4243b.

83.
Embedded Systems Security David Kleidermacher [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Oxford : Newnes, 2012
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 K6721e.

84.
Wireless Reconnaissance in Penetration Testing by Matthew Neely, Alex Hamerstone and Chris Sanyk [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, 2013
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 621.38928 N293w.

85.
Hacking and Penetration Testing with Low Power Devices by Philip Polstra [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, 2015
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 P7678h.

86.
Information Security Analytics by Mark Talabis, Robert McPherson, I Miyamoto and Jason Martin [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, 2015
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 T14i.

87.
Handbook on Securing Cyber-Physical Critical Infrastructure by Sajal K. Das, Krishna Kant and Nan Zhang [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Morgan Kaufmann, 2012
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 D2601h.

88.
Data Hiding by Michael Raggo [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, 2013
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 R1266d.

89.
Trust management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012 Surat, India, May 21-25, 2012, proceedings by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London Springer 2012
Availability: Items available for loan: Central Library (1)Call number: 005.8 D594t.

90.
Cybersecurity ops with bash attack, defend, and analyze from the command line Paul Troncone by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Mumbai Shroff Publishers & Distributors Pvt. Ltd. 2019
Availability: Items available for loan: Central Library (1)Call number: 005.8 T752c.

91.
Cryptography and network security principles and practice William Stallings by
Edition: 7th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Noida Pearson 2017
Availability: Items available for loan: Central Library (1)Call number: 005.82 St18c7.

92.
MPLS VPN security Michael H. Behringer by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Argentina Pearson 2005
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 B396m.

93.
Internet of things security challenges, advances, and analytics by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Press 2019
Availability: Items available for loan: Central Library (1)Call number: 005.8 C4419i.

94.
Information hiding techniques for steganography and digital watermarking Stefan Katzenbeisser by Series: Computer Security Series | Oppliger, Rolf
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Boston Artech House 2000
Availability: Items available for loan: Central Library (1)Call number: 005.8 K1598i.

95.
Digital watermarking and steganography Ingemar J. Cox...[et al.] by Series: Morgan Kaufmann Series in Multimedia Information and Systems | Fox, Edward A
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Amsterdam Elsevier 2008
Availability: Items available for loan: Central Library (1)Call number: 005.8 C8392d.

96.
Software testing principles and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Chennai Pearson 2006
Availability: Items available for loan: Central Library (1)Call number: 005.14 D4608s.

97.
Internet security : a jumpstart for systems administrators and IT managers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Digital Press an imprint of Elsevier 2003
Availability: Items available for loan: Central Library (1)Call number: 005.8 Sp322i.

98.
Quantum key distribution an introduction with exercises by Series: Lecture Notes in Physics | Citro, Roberta
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Switzerland Springer 2021
Availability: Not available: Central Library: Checked out (1).

99.
Understanding cybersecurity technologies a guide to selecting the right cybersecurity tools by Series: Human Element in Smart and Intelligent Systems | Moallem, Abbas
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Press 2002
Availability: Items available for loan: Central Library (1)Call number: 005.8 M711u.

100.
Fundamentals of cryptography introducing mathematical and algorithmic foundations by Series: Undergraduate Topics in Computer Science | Mackie, Ian
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Switzerland Springer 2021
Availability: Items available for loan: Central Library (1)Call number: 005.824 B861f.

Designed & Maintained by: Central Library, LNMIIT, Jaipur