Your search returned 21 results.

|
1. Control and security of E-commerce

by Smith, Gordon E | .

Edition: Material type: Text Text Publisher: New Jersey John Wiley & sons 2004Availability: Items available for loan: [Call number: 681.324:658 SMI] (1).

2. Handbook of information security Vol. 2

by Bidgoli, Hossein | .

Edition: Material type: Text Text Publisher: Wiley 2006Availability: No items available Withdrawn (1).

3. Handbook of information security Vol. 3

by Bidgoli, Hossein | .

Edition: Material type: Text Text Publisher: Wiley 2006Availability: Items available for loan: [Call number: 681.324(100)(031) BI] (1).

4. Enhancing computer security with smart technology

by Vemuri, V. Rao ed | .

Edition: Material type: Text Text Publisher: Boca Raton Auerbach Publications 2006Availability: Items available for loan: [Call number: 681.324.004.4 VEM] (1).

5. Cyber terrorism

by Colarik, Andrew Michael | .

Edition: Material type: Text Text Publisher: Hershey Idea Group Publishing 2006Availability: Items available for loan: [Call number: 681.324(100):343.326] (1).

6. Security of e-systems and computer networks

by Obaidat, Mohammad S | Boudriga, Noureddine.

Edition: Material type: Text Text Publisher: Cambridge Cambridge 2007Availability: Items available for loan: [Call number: 681.324.004.4 OBA] (1).

7. International IT governance

by Calder, Alan | Watkins, Steve.

Edition: Material type: Text Text Publisher: London Kogen Page 2008Availability: Items available for loan: [Call number: 681.3.004.4 CAL] (1).

8. Cryptography and network security

by Forouzan, Behrouz A | .

Edition: Spl. IndiaMaterial type: Text Text Publisher: New Delhi Tata McGraw-Hill 2008Availability: Items available for loan: [Call number: 681.324.004.4 FOR] (1).

9. Information security risk analysis

by Peltier, Thomas R | .

Edition: 2.0Material type: Text Text Publisher: Boca Raton Auerbach 2005Availability: Items available for loan: [Call number: 681.3.004.4 PEL] (1).

10. CERT guide to system and network security practices

by Allen, Julia H | .

Edition: Material type: Text Text Publisher: New York Addison-Wesley 2001Availability: Items available for loan: [Call number: 681.3.004.4 ALL] (1).

11. Information assurance architecture

by Willett, Keith D | .

Edition: Material type: Text Text Publisher: New York CRC Press 2008Availability: Items available for loan: [Call number: 681.3.004.4 WIL] (1).

12. Information security governance

by Solms,R Von | Solms,S H Von.

Edition: Material type: Text Text Publisher: New York Springer 2009Availability: Items available for loan: [Call number: 65.012.45.004.4 SOL] (1).

13. Digital defense

by Parenty, Thomas J | .

Edition: Material type: Text Text Publisher: Boston Harvard business school press 2003Availability: Items available for loan: [Call number: 681.324:658 PAR] (1).

14. Securing the information infrastructure

by Kizza, Joseph | Kizza, Florence Migga.

Edition: Material type: Text Text Publisher: Hershey Cybertech 2008Availability: Items available for loan: [Call number: 681.3.004.4 KIZ] (1).

15. Information System Audit and Assurance

by Dube, D.P | Gulati, V.P.

Edition: Material type: Text Text Publisher: New Delhi Tata McGraw-Hill 2005Availability: Items available for loan: [Call number: 657.6:681.324 DUB/I] (1).

16. Auditing cloud computing

by Halpert, Ben | .

Edition: Material type: Text Text Publisher: New Jersey John Wiley and Sons 2011Availability: Items available for loan: [Call number: 681.324:658 HAL/A] (1).

17. Introduction to information security

by Shimeall, Timothy J | Spring, Jonathan M.

Edition: Material type: Text Text Publisher: USA Syngress 2014Availability: Items available for loan: [Call number: 681.3.004.4 SHI/I] (1).

18. IT governance An international Guide to data security and ISO27001/ISO2700

by Calder, Alan | Watkins, Steve.

Edition: 6th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: London Kogan Page c2015Availability: Items available for loan: [Call number: 681.324.004.4 CAL/I] (1).

19. Web security A whitehat perspective

by Wu, Hanqing | Zhao, Liz.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York CRC Press 2015Availability: Items available for loan: [Call number: 681.324.004.4 WU/W] (1).

20. Cyber security.Simply.Make it happen.: Leverging digitization through IT security

by Abolhassan, Ferri.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer; 2017Availability: Items available for loan: [Call number: 681.324.004 ABO/C] (1).

Copyright © 2020. Library & Information Centre, Indian Institute of Management Kozhikode
Koha version:19.05.02.000