Welcome to LNMIIT Central Library
Online Public Access Catalogue

Your search returned 21 results.

Sort
Results
1.
Designing network security Merike Kaeo by
Edition: 2nd ed.
Material type: Text Text
Language: English
Publication details: Delhi Pearson Education (Singapore) 2004
Availability: Items available for loan: Central Library (1)Call number: 005.8 K117d2.

2.
Security in computing Charles P. Pfleeger by
Edition: 3rd ed.
Material type: Text Text
Language: English
Publication details: New Delhi Prentice-Hall of India Private Limited 2003
Availability: Items available for loan: Central Library (3)Call number: 005.8 P483s3, ... Not available: Central Library: Checked out (1).

3.
Digital identity unmasking identity management architecture Phillip J. Windley by
Material type: Text Text
Language: English
Publication details: Mumbai Shroff Publishers & Distributors Pvt. Ltd. 2005
Availability: Items available for loan: Central Library (1)Call number: 005.8 W723d.

4.
Implementing database security and auditing a guide for DBAs, information security administrators and auditors Ron Ben Natan by
Material type: Text Text
Language: English
Publication details: New Delhi Elsevier 2005
Availability: Items available for loan: Central Library (2)Call number: 005.74 N191i, ...

5.
Fundamentals of computer security Josef Pieprzyk by
Material type: Text Text
Language: English
Publication details: New Delhi Springer (India) 2003
Availability: Items available for loan: Central Library (2)Call number: 005.8 P599f, ... Items available for reference: Central Library: Not for loan (2)Call number: 005.8 P599f, ... Not available: Central Library: Checked out (1).

6.
Legal issues in information security Joanna Lyn Grama by Series: Information Systems Security & Assurance Series
Edition: 2nd ed.
Material type: Text Text
Publication details: Burlington Jones and Bartlett 2015
Availability: Items available for loan: Central Library (1)Call number: 349.73 G7617l2.

7.
Security policies and implementation issues by
Edition: 2nd
Material type: Text Text
Publication details: Burlington Jones And Bartlett 2015
Availability: Items available for loan: Central Library (1)Call number: 005.8 J6301s2.

8.
Cyber security policy guidebook Jennifer L. Bayuk...[et al.] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New Delhi Wiley 2012
Availability: Items available for loan: Central Library (1)Call number: 005.8 B345c.

9.
Privacy and big data: the players, regulators, and stakeholders by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai : Shroff Publishers, 2011
Availability: Items available for loan: Central Library (1)Call number: 005.265 C8441p.

10.
Data Hiding by Michael Raggo [E-Book] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington : Syngress, 2013
Online resources:
Availability: Items available for loan: Central Library (1)Call number: 005.8 R1266d.

11.
Hadoop security protecting your big data platform Ben Spivey by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Mumbai Shroff Publishers & Distributors Pvt. Ltd. 2015
Availability: Items available for loan: Central Library (1)Call number: 005.74 Sp498h.

12.
Information hiding techniques for steganography and digital watermarking Stefan Katzenbeisser by Series: Computer Security Series | Oppliger, Rolf
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Boston Artech House 2000
Availability: Items available for loan: Central Library (1)Call number: 005.8 K1598i.

13.
Digital watermarking and steganography Ingemar J. Cox...[et al.] by Series: Morgan Kaufmann Series in Multimedia Information and Systems | Fox, Edward A
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Amsterdam Elsevier 2008
Availability: Items available for loan: Central Library (1)Call number: 005.8 C8392d.

14.
Software testing principles and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Chennai Pearson 2006
Availability: Items available for loan: Central Library (1)Call number: 005.14 D4608s.

15.
Security in computing by
Edition: 5th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Noida Pearson 2018
Availability: Not available: Central Library: Checked out (1).

16.
Federated learning by Series: Synthesis Lectures on Artificial Intelligence and Machine Learning | Brachman, Ronald J
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Switzerland Springer 2022
Availability: Not available: Central Library: Checked out (1).

17.
Practical cryptography in python learning correct cryptography by example by
Publication details: New York Apress 2019
Availability: Items available for loan: Central Library (1)Call number: 005.82 N5548p.

18.
Data protection ensuring data availability by
Publication details: London Crc Press Taylor 2017
Availability: Items available for loan: Central Library (1)Call number: 005.8 D3656d.

19.
Information systems security: 20th International Conference, ICISS 2024, Jaipur, India, December 16-20, 2024 Proceedings by Series: Lecture Notes in Computer Science; 15416 | Goos, Gerhard
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Switzerland Springer 2025
Availability: Items available for loan: Central Library (7)Call number: 005.8 P2738i, ...

20.
Data new trajectories in law by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New York Routledge 2021
Availability: Items available for loan: Central Library (1)Call number: 343.0999 H423d.

Designed & Maintained by: Central Library, LNMIIT, Jaipur