Your search returned 11 results. Subscribe to this search

Not what you expected? Check for suggestions
|
Defending the digital frontier: a security agenda

by Doll, Mark W | Granado, Jose | Rai, Sajay.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey John WIley & Sons, Inc. 2003Availability: Items available for loan: Vikram Sarabhai Library [Call number: 332.673 D6D3] (1).

Demographic and socioeconomic determinants of contraceptive use among Urban women...: A case study of port Vila town in Vanuatu

by Jayaraman, T. K.

Publisher: Manila Asia Development Bank 1995Availability: Items available for loan: Vikram Sarabhai Library [Call number: 312 J2D3] (1).

Building an effective information security policy architecture

by Bacik, Sandy.

Publisher: Boca Raton CRC Press 2008Availability: Items available for loan: Vikram Sarabhai Library [Call number: 005.8 B2B8] (1).

Statistical techniques for network security: modern statistically-based intrusion detection and protection

by Wang, Yun.

Publisher: Hershey Information Science Reference 2009Availability: Items available for loan: Vikram Sarabhai Library [Call number: 005.8 W2S8] (1).

Information systems security: security management, metrics, frameworks and best practices (CD)

by Godbole, Nina.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi John Wiley & Sons 2009Availability: Items available for reference: Vikram Sarabhai Library [Call number: D001747] (1).

Securing the virtual environment: how to defend the enterprise against attack

by Ottenheimer, Davi | Wallace, Matthew.

Publisher: New Delhi Wiley India 2012Availability: Items available for loan: Vikram Sarabhai Library [Call number: 005.8 O8S3] (1).

Securing the virtual environment: how to defend the enterprise against attack (CD)

by Ottenheimer, Davi.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Wiley India 2012Availability: Items available for reference: Vikram Sarabhai Library [Call number: D002112] (1).

Enhancing computer security with smart technology

by Vemuri, V. Rao [Editor].

Publisher: New York Auerbach Publications 2006Availability: Items available for loan: Vikram Sarabhai Library [Call number: 005.8 E6] (1).

Digital identity

by Windley, Phillip J.

Publisher: Sebastopol Shroff Publishers & Distributors 2005Availability: Items available for loan: Vikram Sarabhai Library [Call number: 004.068 W4D4] (1).

Identity management: a primer

by Williamson, Graham | Yip, David | Sharoni, Ilan | Spaulding, Kent.

Publisher: Lewisville Mc Press 2009Availability: Items available for loan: Vikram Sarabhai Library [Call number: 005.8 W4I2] (1).

Mechanics of user identification and authentication: fundamentals of identity management

by Todorov, Dobromir.

Publisher: Boca Raton Auerbach Publications 2007Availability: Items available for loan: Vikram Sarabhai Library [Call number: 005.8 T6M3] (1).

Powered by Koha