Your search returned 36 results.

Not what you expected? Check for suggestions
E-policy: how to develop computer, e-mail, and internet guidelines to protect your company and its assets Overly, Michael R.

by Overly, Michael R.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York American Management Association 1999Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 651.79 O9E7 (1).

Technology and privacy: the new landscape

by Agre, Philip E [Editor] | Rotenberg, Marc [Editor].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Cambridge The MIT Press 1998Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 364.168 T3 (1).

Netspionage: the global threat to information Boni, William

by Boni, William | Kovacich, Gerald L.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston Butterworth Heinemann 2000Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 364.168 B6N3 (1).

Cyber crimes: notorious aspects of the human and the net Barua, Yogesh

by Barua, Yogesh | Dayal, Denzyl P.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New Delhi Dominant Publishers and Distributors 2001Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 364.168 C9-I (4).

Incident response: investigating computer crime Prosise, Chris

by Prosise, Chris | Mandia, Kevin.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New Delhi Tata McGraw-Hill Publishing Company Limited 2001Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 364.168 P7I6 (1).

Information warfare: how to survive cyber attacks Erbschloe, Michael

by Erbschloe, Michael.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New Delhi Tata McGraw-Hill Publishing Company Limited 2001Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 364.168 E7I6 (1).

Information warfare: corporate attack and defense in a digital world Hutchinson, Bill

by Hutchinson, Bill | Warren, Matt.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Oxford Butterworth/Heinemann 2001Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 364.168 H8I6 (1).

Hacked, attacked and abused: digital crime exposed

by Lilley, Peter.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: London Kogan Page 2002Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 364.168 L4H2 (1).

Computers, ethics, and society

by Ermann, M. David [Editor] | Shauf, Michele S [Editor].

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York Oxford University Press 2003Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 651.26 C6/2003 (1).

Cyber crimes: a primer on internet threats and email abuses Kumar, Ram G.

by Kumar, Ram G.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New Delhi Viva Books Private Limited 2006Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 364.168 K8C9 (1).

Digital certificates: applied internet security (CD) Feghhi, Jalal

by Feghhi, Jalal | Feghhi, Jalil | Williams, Peter.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Massachusetts Addison-Wesley Publishing 1999Availability: Items available for reference: Vikram Sarabhai Library Not for loanCall number: D000298 (1). :

Preventing computer fraud Stern, Dana L.

by Stern, Dana L.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York McGraw-Hill 1993Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 364.168 S8P7 (1).

Practical UNIX security Garfinkel, Simson

by Garfinkel, Simson | Spafford, Gane.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Sebastopol O'Reilly & Associates, Inc. 1993Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 510.7834 G2P7 (1).

Building an effective information security policy architecture Bacik, Sandy

by Bacik, Sandy.

Publisher: Boca Raton CRC Press 2008Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 005.8 B2B8 (1).

Statistical techniques for network security: modern statistically-based intrusion detection and protection Wang, Yun

by Wang, Yun.

Publisher: Hershey Information Science Reference 2009Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 005.8 W2S8 (1).

Information systems security: security management, metrics, frameworks and best practices Godbole, Nina

by Godbole, Nina.

Publisher: New Delhi John Wiley & Sons 2009Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 005.8 G6I6 (1).

Multimedia encryption and watermaking

by Furht, Borivoje.

Publisher: New York Springer 2005Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 005.8 F8M8 (1).

Information systems security: security management, metrics, frameworks and best practices (CD) Godbole, Nina

by Godbole, Nina.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New Delhi John Wiley & Sons 2009Availability: Items available for reference: Vikram Sarabhai Library Not for loanCall number: D001747 (1). :

How personal and Internet security work Gralla, Preston

by Gralla, Preston.

Publisher: Noida Dorling Kindersley/Pearson Education 2012Availability: Items available for loan: Vikram Sarabhai LibraryCall number: 005.8 G7H6 (1).

Security de-engineering : solving the problems in information risk management Tibble, Ian.

by Tibble, Ian.

Publisher: Boca Raton CRC Press 2011Availability: Items available for reference: Vikram Sarabhai Library Processing CenterCall number: 658.478 T4S3 (1). :

Powered by Koha