Refine your search

Your search returned 9 results.

Not what you expected? Check for suggestions
1.
The Myth of Secure Computing Austin, Robert D.

by Austin, Robert D.

Material type: Article Article; Format: print Publisher: 2003Availability: Items available for loan: Ahmedabad (HO)Call number: (1).

2.
Enterprise identity management towards an investment decision support approach

by Royer, Denis.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York Springer 2013Availability: No items available : Withdrawn (1).

3.
An Unprogrammed life adventures of an incurable entrepreneur

by Saito, William H.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Fusionopolis Walk, Singapore John Wiley and Sons (Asia) Pte. Ltd. 2012Availability: Items available for loan: Ahmedabad (HO)Call number: 338.04092 S2U6 (1).

4.
Windows hacking 2.0 [compatible with Windows 7]

by Fadia, Ankit.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Noida Vikas Publishing House Pvt.Ltd. 2012Availability: Items available for loan: Ahmedabad (HO)Call number: 005.8 F2W4 (1).

5.
Intrusion alert an ethical hacking guide to intrusion detection

by Fadia, Ankit | Zacharia, Manu.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New Delhi Vikas 2007Availability: No items available : Withdrawn (1).

6.
Enterprise security for the executive: setting the tone from the top

by Bayuk, Jennifer L.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Santa Barbara, CA Praeger 2010Availability: Items available for loan: Ahmedabad (HO)Call number: 658.47 B2E6 (1).

7.
The Fifth domain; defending our country, our companies, and ourselves in the age of cyber threats

by Clarke, Richard A | Knake, Robert K.

Publisher: New York Penguin Press 2019Availability: Items available for loan: Ahmedabad (HO)Call number: 363.325 C5F4 (1).

8.
Data governance and data management: contextualizing data governance drivers, technologies, and tools

by Mahanti, Rupa.

Publisher: Singapore Springer 2021Availability: Items available for loan: Ahmedabad (HO)Call number: 005.8 D2 (1).

9.
Cybersecurity: the beginner's guide: a comprehensive guide to getting started in cybersecurity

by Ozkaya, Erdal.

Publisher: Mumbai / Birmingham, UK Packt Publishing Ltd. 2019Availability: Items available for loan: Ahmedabad (HO)Call number: 001 P2 (1).

Copyrights © EDII Library and Information Centre 2024. All Right Reserved

Free Hit Counter