Your search returned 30 results. Subscribe to this search

Not what you expected? Check for suggestions
|
E-policy: how to develop computer, e-mail, and internet guidelines to protect your company and its assets

by Overly, Michael R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York American Management Association 1999Availability: Items available for loan: Vikram Sarabhai Library [Call number: 651.79 O9E7] (1).

Technology and privacy: the new landscape

by Agre, Philip E [Editor] | Rotenberg, Marc [Editor].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge The MIT Press 1998Availability: Items available for loan: Vikram Sarabhai Library [Call number: 364.168 T3] (1).

Netspionage: the global threat to information

by Boni, William | Kovacich, Gerald L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston Butterworth Heinemann 2000Availability: Items available for loan: Vikram Sarabhai Library [Call number: 364.168 B6N3] (1).

Cyber crimes: notorious aspects of the human and the net

by Barua, Yogesh | Dayal, Denzyl P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Dominant Publishers and Distributors 2001Availability: Items available for loan: Vikram Sarabhai Library [Call number: 364.168 C9-II] (4).

Incident response: investigating computer crime

by Prosise, Chris | Mandia, Kevin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Tata McGraw-Hill Publishing Company Limited 2001Availability: Items available for loan: Vikram Sarabhai Library [Call number: 364.168 P7I6] (1).

Information warfare: how to survive cyber attacks

by Erbschloe, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Tata McGraw-Hill Publishing Company Limited 2001Availability: Items available for loan: Vikram Sarabhai Library [Call number: 364.168 E7I6] (1).

Information warfare: corporate attack and defense in a digital world

by Hutchinson, Bill | Warren, Matt.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Oxford Butterworth/Heinemann 2001Availability: Items available for loan: Vikram Sarabhai Library [Call number: 364.168 H8I6] (1).

Hacked, attacked and abused: digital crime exposed

by Lilley, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London Kogan Page 2002Availability: Items available for loan: Vikram Sarabhai Library [Call number: 364.168 L4H2] (1).

Computers, ethics, and society

by Ermann, M. David [Editor] | Shauf, Michele S [Editor].

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York Oxford University Press 2003Availability: Items available for loan: Vikram Sarabhai Library [Call number: 651.26 C6/2003] (1).

Cyber crimes: a primer on internet threats and email abuses

by Kumar, Ram G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Viva Books Private Limited 2006Availability: Items available for loan: Vikram Sarabhai Library [Call number: 364.168 K8C9] (1).

Digital certificates: applied internet security (CD)

by Feghhi, Jalal | Feghhi, Jalil | Williams, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts Addison-Wesley Publishing 1999Availability: Items available for reference: Vikram Sarabhai Library [Call number: D000298 ] (1).

Preventing computer fraud

by Stern, Dana L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York McGraw-Hill 1993Availability: Items available for loan: Vikram Sarabhai Library [Call number: 364.168 S8P7] (1).

Practical UNIX security

by Garfinkel, Simson | Spafford, Gane.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol O'Reilly & Associates, Inc. 1993Availability: Items available for loan: Vikram Sarabhai Library [Call number: 510.7834 G2P7] (1).

Building an effective information security policy architecture

by Bacik, Sandy.

Publisher: Boca Raton CRC Press 2008Availability: Items available for loan: Vikram Sarabhai Library [Call number: 005.8 B2B8] (1).

Statistical techniques for network security: modern statistically-based intrusion detection and protection

by Wang, Yun.

Publisher: Hershey Information Science Reference 2009Availability: Items available for loan: Vikram Sarabhai Library [Call number: 005.8 W2S8] (1).

Information systems security: security management, metrics, frameworks and best practices

by Godbole, Nina.

Publisher: New Delhi John Wiley & Sons 2009Availability: Items available for loan: Vikram Sarabhai Library [Call number: 005.8 G6I6] (1).

Multimedia encryption and watermaking

by Furht, Borivoje.

Publisher: New York Springer 2005Availability: Items available for loan: Vikram Sarabhai Library [Call number: 005.8 F8M8] (1).

Information systems security: security management, metrics, frameworks and best practices (CD)

by Godbole, Nina.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi John Wiley & Sons 2009Availability: Items available for reference: Vikram Sarabhai Library [Call number: D001747] (1).

How personal and Internet security work

by Gralla, Preston.

Publisher: Noida Dorling Kindersley/Pearson Education 2012Availability: Items available for loan: Vikram Sarabhai Library [Call number: 005.8 G7H6] (1).

Security de-engineering : solving the problems in information risk management

by Tibble, Ian.

Publisher: Boca Raton CRC Press 2011Availability: Items available for reference: Vikram Sarabhai Library [Call number: 658.478 T4S3] (1).

Powered by Koha