Your search returned 11 results. Subscribe to this search

|
1. Cloud Computing: Implementation, Management and Security by John W. Rittinghouse and James F. Ransome

by Rittinghouse, John W | Ransome, James F.

Edition: First Indian Reprint 2012Material type: book Book; Format: print ; Literary form: Not fiction Publisher: India CRC Press 2012Availability: Items available for loan: Institute of Technology [Call number: 004.36 RIT] (1).

2. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance by Tim Mather, Subra Kumaraswamy, Shahed Latif

by Mather, Tim | Kumaraswamy, Subra | Latif, Shahed.

Edition: 3rd Indian Reprint 2011Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai Shroff Publishers & Distributors Pvt. Ltd. 2009Availability: Items available for loan: Institute of Technology [Call number: 005.8 MAT] (1). Checked out (1).

3. Computer Security: Principles and Practice by William Stallings and Lawrie Brown

by Stallings, William | Brown, Lawrie.

Edition: Second Impression 2012Material type: book Book; Format: print ; Literary form: Not fiction Publisher: India Pearson Education Asia Pte. Ltd. 2008Availability: Items available for loan: Institute of Technology [Call number: 005.8 STA] (10). Checked out (2).

4. Information Security Handbook by John M. D. Hunter

by Huntel, John M. D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Springer (India) Pvt. Ltd. 2010Availability: Items available for loan: Institute of Technology [Call number: 005.8 HUN] (2).

5. IT Auditing Using Controls to Protect Information Assets by Chris Davis, Mike Schiller and Kevin Wheeler

by Davis, Chris | Schiller, Mike | Wheeler, Kevin.

Edition: 2nd ed 2nd reprint 2012Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Tata McGraw Hill Education Private Limited 2011Availability: Items available for loan: Institute of Technology [Call number: 005.8 DAV] (2).

6. Intrusion Detection Systems by Roberto Di Pietro and Luigi V. Mancini

by Di Pietro, Roberto | Mancini, Luigi V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York Springer Science+Business Media, Inc 2008Availability: Items available for reference: Institute of Technology [Call number: 005.8 DIP] (1).

7. Intrusion Detection Systems with Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP and ACID by Rafeeq Ur Rehman

by Rehman, Rafeeq Ur.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: USA PTR Publication 2003Availability: Items available for reference: Institute of Technology [Call number: 005.8 REH] (1).

8. Practical Embedded Security: Building Secure Resource-Constrained Systems by Timothy Stapko

by Stapko,Timothy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington Elsevier 2008Availability: Items available for reference: Institute of Technology [Call number: 005.8 STA] (1).

9. Principles of Embedded Networked System Design by Gregory Pottie and William Kaiser

by Pottie, Gregory | Kaiser, William.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York Cambridge University Press 2005Availability: Items available for reference: Institute of Technology [Call number: 004.21 POT] (1).

10. Security in Distributed, Grid, Mobile and Pervasive Computing by Yang Xiao

by Xiao, Yang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: USA Auerbach Publications 2007Availability: Items available for reference: Institute of Technology [Call number: 005.8 XIA] (1).

11. Security in Embedded Devices by Catherine H. Gebotys

by Gebotys, Catherine H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York Springer Science+Business Media, Inc 2010Availability: Items available for reference: Institute of Technology [Call number: 005.8 GEB] (2).

Copyrights © Nirma University 2018. All Right Reserved