Your search returned 11 results.

Not what you expected? Check for suggestions
Defending the digital frontier: a security agenda Doll, Mark W.

by Doll, Mark W | Granado, Jose | Rai, Sajay.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New Jersey John WIley & Sons, Inc. 2003Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 332.673 D6D3 (1).

Demographic and socioeconomic determinants of contraceptive use among Urban women...: A case study of port Vila town in Vanuatu Jayaraman, T. K.

by Jayaraman, T. K.

Publisher: Manila Asia Development Bank 1995Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 312 J2D3 (1).

Building an effective information security policy architecture Bacik, Sandy

by Bacik, Sandy.

Publisher: Boca Raton CRC Press 2008Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 005.8 B2B8 (1).

Statistical techniques for network security: modern statistically-based intrusion detection and protection Wang, Yun

by Wang, Yun.

Publisher: Hershey Information Science Reference 2009Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 005.8 W2S8 (1).

Information systems security: security management, metrics, frameworks and best practices (CD) Godbole, Nina

by Godbole, Nina.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New Delhi John Wiley & Sons 2009Availability: Items available for reference: Vikram Sarabhai Library Not for loanCall number: D001747 (1). :

Securing the virtual environment: how to defend the enterprise against attack Ottenheimer, Davi

by Ottenheimer, Davi | Wallace, Matthew.

Publisher: New Delhi Wiley India 2012Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 005.8 O8S3 (1).

Securing the virtual environment: how to defend the enterprise against attack (CD) Ottenheimer, Davi

by Ottenheimer, Davi.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New Delhi Wiley India 2012Availability: Items available for reference: Vikram Sarabhai Library Not for loanCall number: D002112 (1). :

Enhancing computer security with smart technology

by Vemuri, V. Rao [Editor].

Publisher: New York Auerbach Publications 2006Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 005.8 E6 (1).

Digital identity Windley, Phillip J.

by Windley, Phillip J.

Publisher: Sebastopol Shroff Publishers & Distributors 2005Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 004.068 W4D4 (1).

Identity management: a primer Williamson, Graham

by Williamson, Graham | Yip, David | Sharoni, Ilan | Spaulding, Kent.

Publisher: Lewisville Mc Press 2009Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 005.8 W4I2 (1).

Mechanics of user identification and authentication: fundamentals of identity management Todorov, Dobromir

by Todorov, Dobromir.

Publisher: Boca Raton Auerbach Publications 2007Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 005.8 T6M3 (1).

Powered by Koha