Koha online
Your cart is empty.
Cart
Your cart is empty.
Lists
Public lists
New Arrivals
View All
Your lists
Log in to create your own lists
Log in to your account
Search history
[
x
]
Vidyasyahadri
...
About Us
KUL Libray
Library Rules
Services
Collection
Library Team
E-Journals
E-Books
e-News Paper
Kannada
Prajavani
Kannada Prabha
Vijay Karnataka
Udayavani
Vijayavani
Samyukthakarnataka
English
Times of India
Deccan Herald
Business Standard
Businessline
Deccan Chronicle
DNA
The Economic Times
Financial Chronicle
Financial Express
Indian Express
Mint
Pioneer
The Hindu
The Statesman
e-Library
National Digital Library
National Science Digital Lib
IIT/NIT Libraries
e-Learning
NPTEL
EDUSAT
VIDYAMITRA
SWAYAM MOOCS
MIT Open Courseware
e-Learning@VTU
e-CONTENT
KU-IR
News Clippings
Search
Library catalog
Title
Author
Subject
ISBN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
×
Log in to your account
Login:
Password:
Home
›
Results of search for 'su:Computer security'
Refine your search
Availability
Limit to currently available items.
Authors
Halton, Wolf
Lawrie, Brown.
Pieprzyk, Josef
Stallings, William
Sutton, Michael
Show more
Holding libraries
Kuvempu University Library
Item types
Books
Reference
Your search returned 9 results.
Unhighlight
Highlight
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
|
1.
Computer forensics:principles and practices /
by
Volonino, Linda
Publication:
New Jersey: Pearson Education, 2007 . xviii, 534 p. ;
Date:
2007
Availability:
Items available:
Kuvempu University Library (1),
Place hold
Add to cart
(remove)
2.
Fundamentals of computer security /
by
Pieprzyk, Josef
Publication:
New Delhi: Springer, 2003 . xx, 677 p. ;
Date:
2003
Availability:
Items available:
Kuvempu University Library (1),
Kuvempu University Library (1),
Place hold
Add to cart
(remove)
3.
Fuzzing: brute force vulnesability discovery /
by
Sutton, Michael
Publication:
New Jersey: Upper saddle River, 2007 . xxvii, 543 p. ;
Date:
2007
Availability:
Items available:
Kuvempu University Library (1),
Place hold
Add to cart
(remove)
4.
Java security
by
Preeti Jain
Publication:
New Delhi: Centrum press, 2011 . v, 280 p. ;
Date:
2011
Availability:
Items available:
Kuvempu University Library (1),
Place hold
Add to cart
(remove)
5.
Computer security: principles and practice.
by
Stallings, William
Publication:
Noida: Pearson Education, 2008 . xviii, 798 p. ;
Date:
2008
Availability:
Items available:
Kuvempu University Library (1),
Place hold
Add to cart
(remove)
6.
No cover image available
Computer security: principles and practice.
by
Stallings, William.
Publication:
Noida: Pearson Education , 2008 . xviii, 798p.
Date:
2008
Availability:
No items available:
Add to cart
(remove)
7.
No cover image available
Computer and information security handbook
by
Vacca, John R,
Publication:
Amsterdam: 2013 . xxviii, 1171p.
Date:
2013
Availability:
No items available:
Add to cart
(remove)
8.
Computer security:concepts, Issues, and Implimentation
by
Basta, Alfred
Publication:
Australia: Course Technology, 2007 . 309 p. ;
Date:
2007
Availability:
Items available:
Kuvempu University Library (1),
Place hold
Add to cart
(remove)
9.
Elementary information security
by
Smith, Richard E
Publication:
Burlington: Jones & Bartlett Learning, 2016 . xxi, 866 p. ;
Date:
2016
Availability:
No items available:
Add to cart
(remove)
Powered by
Koha