Welcome to LNMIIT Central Library
Online Public Access Catalogue

Refine your search

Your search returned 232 results.

Sort
Results
81.
Cloud computing technologies and strategies of the ubiquitous data center Brian J.S. Chee by
Material type: Text Text
Language: English
Publication details: Boca Raton CRC Press 2010
Availability: Items available for loan: Central Library (1)Call number: 004.6782 C414c.

82.
Fundamentals of information systems security by
Edition: 2nd
Material type: Text Text
Publication details: Burlington Jones And Bartlett 2014
Availability: Items available for loan: Central Library (1)Call number: 005.8 K5601f2.

83.
Legal issues in information security Joanna Lyn Grama by Series: Information Systems Security & Assurance Series
Edition: 2nd ed.
Material type: Text Text
Publication details: Burlington Jones and Bartlett 2015
Availability: Items available for loan: Central Library (1)Call number: 349.73 G7617l2.

84.
Cyberwarfare information operations in a connected world Mike Chapple by Series: Information Systems Security & Assurance Series
Material type: Text Text
Publication details: Burlington Jones and Bartlett 2015
Availability: Items available for loan: Central Library (1)Call number: 335.4 C3687c.

85.
Security policies and implementation issues by
Edition: 2nd
Material type: Text Text
Publication details: Burlington Jones And Bartlett 2015
Availability: Items available for loan: Central Library (1)Call number: 005.8 J6301s2.

86.
Hacker techniques, tools, and incident handling by Series: Information Systems Security & Assurance Series
Edition: 2nd ed.
Material type: Text Text
Publication details: Burlington Jones & Bartlett 2014
Availability: Items available for loan: Central Library (1)Call number: 621.38 Or49h2.

87.
Security strategies in Windows platforms and applications by
Edition: 2nd
Material type: Text Text
Publication details: Burlington Jones And Bartlett 2014
Availability: Items available for loan: Central Library (1)Call number: 005.8 Sop471s2.

88.
Modern cryptanalysis techniques for advanced code breaking by
Material type: Text Text
Publication details: Indianpolis Wiley 2008
Availability: Items available for loan: Central Library (1)Call number: 005.8 Sw42c.

89.
End of plenty the race to feed a crowded world by
Material type: Text Text
Publication details: New Delhi Speaking Tiger 2016
Availability: Items available for loan: Central Library (1)Call number: 363.8 B6675e.

90.
Cryptanalysis of RSA and its variants by
Material type: Text Text
Publication details: Boca Raton CRC Press 2010
Availability: Items available for loan: Central Library (1)Call number: 005.82 H588c.

91.
Data and goliath the hidden battles to collect your data and control your world Bruce Schneier by
Material type: Text Text
Language: English
Publication details: New York W. W. Norton & Company 2015
Availability: Items available for loan: Central Library (1)Call number: 005.8 Sch588d.

92.
Cryptanalysis of number theoretic ciphers Samuel S. Wagstaff by Series: Computational Mathematics Series | Mike J. Atallah
Material type: Text Text
Language: English
Publication details: Boca Raton Chapman &Hall /CRC 2003
Availability: Not available: Central Library: Checked out (1).

93.
Introduction to hardware security and trust by
Material type: Text Text
Publication details: New York Springer 2012
Availability: Items available for loan: Central Library (1)Call number: 005.8 T233i.

94.
Wiley handbook of psychology, technology and society Larry D. Rosen by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Chichester Wiley 2015
Availability: Items available for loan: Central Library (1)Call number: 302 R7223w.

95.
Introduction to modern cryptography Jonathan Katz by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton CRC Press 2015
Availability: Items available for loan: Central Library (1)Call number: 005.8 K1591i2.

96.
Understanding cryptography a textbook for students and practitioners Christof Paar by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Berlin Springer 2010
Availability: Items available for loan: Central Library (1)Call number: 005.82 P111u.

97.
Cryptography and network security principles and practice William Stallings by
Edition: 6th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Noida Pearson 2014
Availability: Items available for loan: Central Library (1)Call number: 005.82 St18c6.

98.
Network security tools writing, hacking and modifying security tools Nitesh Dhanjani by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Mumbai Shroff Publishers & Distributors Pvt. Ltd. 2005
Availability: Items available for loan: Central Library (1)Call number: 005.8 D5355n.

99.
Network security through data analysis building situational awareness Michael Collins by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Mumbai Shroff Publishers & Distributors Pvt. Ltd. 2014
Availability: Items available for loan: Central Library (1)Call number: 005.8 C6921n.

100.
802.11 Security securing wireless networks Bruce Potter by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Mumbai Shroff Publishers & Distributors Pvt. Ltd. 2003
Availability: Items available for loan: Central Library (1)Call number: 005.8 P8518.

Designed & Maintained by: Central Library, LNMIIT, Jaipur