Your search returned 11 results.

Sort
Results
1.
Multilevel secure transaction processing by Vijay Atluri, Sushil Jajodia, Binto George by
Publication details: Dordrecht ; Boston Kluwer Academic c2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.74 ATL.

2.
Time granularities in databases, data mining, and temporal reasoning Claudio Bettini, Sushil Jajodia, Sean Wang by
Publication details: Berlin Springer c2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.3 BET.

3.
Trusted recovery and defensive information warfare by Peng Liu, Sushil Jajodia by
Publication details: Boston, MA Kluwer Academic c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.62 LIU.

4.
5.
6.
7.
Intrusion detection in distributed systems : an abstraction-based approach by Peng Ning, Sushil Jajodia, X. Sean Wang by
Publication details: Dorcrecht ; Boston Kluwer Academic Publishers 2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 NIN.

8.
Advanced transaction models and architectures edited by Sushil Jajodia and Larry Kerschberg by
Publication details: Boston Kluwer Academic Publishers c1997
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.74 JAN.

9.
Applications of data mining in computer security edited by Daniel Barbarʹa, Sushil Jajodia by
Publication details: Boston Kluwer Academic Publishers c2002
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.8 BAR, ...

10.
Secure Cloud Computing / Jajodia, Sushil Et Al by
Edition: 1st edition
Publication details: Springer 2020
Availability: Items available for loan: Anna Centenary Library (1)Call number: 4.67 JAJ.

11.
Secure Cloud Computing / Jajodia, Sushil Et Al by
Publication details: 2020
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 JAJ.

Pages

Find us on the map

Powered by Koha