Skip to main content
Anna Centenary Library
Lists
Public lists
கணினி1
View all
Your cookies
Search history
Clear
Search the Library Catalogue
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Accession No.
Go
Advanced search
Search
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
Library
Log in to your account
×
Login:
Password:
Home
Advanced search
Results of search for 'su:"Data Security"'
Refine your search
Availability
Limit to records with available items
Authors
Bhaskar, SM
Cameron, Rob
Clark, Graham
Flamm, Jacqueline
Furnell, Steven
Maier, Phillip Q
Nelson, Bill
Parikh, Kalpesh
Ramachandran, P
Rash, Michael Rash
Rohmeyer, Paul
Schmied, Will
Shepherd, Matthew
Shinder, Debra
Spooner, David L
Steuart, Chris
Terrill, Lynda
Walther, Henrik
White, Gregory
Williams, Dwayne
Show more
Show less
Item types
Books
English Books
Locations
3RD FLOOR, A WING
Topics
Client/server comput...
COMOPUTER SCIENCE; D...
Computer Forensics
Computer Investigati...
Computer programming
Computer science
Computer Security, R...
Computers - Reliabil...
Cryptography
CYBER SECURITY
Data Security
Data security; SWOC ...
digital signature
FireWall
firewalls
Firewalls (Computer ...
Hacking
Juniper networks
Microsoft Exchange s...
Systems and Data Sec...
Show more
Show less
Your search returned 26 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to...
[ New list ]
Results
1.
No cover image available
MCSE/MCSA implementing and Administering Security in a Windows 2000 network: study guide and DVD training system (exam 70-214)
Will Schmied and Thomas W. Shinder
by
Schmied, Will
Shinder, Thomas W
Publication details:
Berlin
Springer
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SCH
.
2.
Principles of computer security: CompTIA Security+ and Beyone
Wm Arthur Conklin, Gregory White, Dwayne Williams
by
Conklin, Wm Arthur
White, Gregory
Williams, Dwayne
Publication details:
New Delhi
Mcgraw-hill/osborne Media
2012
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MCG
.
3.
Web Service Security—scenarios, patterns, and implementation guidance for Web services Enhancements (WSE) 3. 0, patterns & practices, Hogg, Et Al
by
Ms Dynamics Ax Team
Publication details:
New Delhi
P H I
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 WEB
.
4.
Community experiences: reading and communication for civics
Lynda Terrill, Jacqueline Flamm
by
Terrill, Lynda
Flamm, Jacqueline
Publication details:
New York
McGraw-Hill
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 TER
.
5.
Computer forensics and investigations
Bill Nelson, Amelia Phillips
by
Nelson, Bill
Phillips, Amelia
Publication details:
Indianapolis, IN
Course Technology
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 NEL
.
6.
Computer insecurity : risking the system
Steven, Furnell
by
Furnell, Steven
Publication details:
Berlin ; New York
Springer
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 FUR
.
7.
Computer safety, reliability, and security
Farhad Ahamad, Seyed Shahrestani et al
by
Ahamad, Farhad
Shahrestani, Seyed
Publication details:
United Kingdom
[publisher not identified]
2016
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.1 AHA
.
8.
Configuring juniper networks NetScreen & SSG firewalls
Rob Cameron; Juniper Networks, Inc.; ScienceDirect (Online service); et al
by
Cameron, Rob
Publication details:
Rockland, MA
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CAM
.
9.
CYA securing exchange server 2003 and outlook Web access
Henrik Walther, Patrick Santry
by
Walther, Henrik
Santry, Patrick
Publication details:
Rockland, MA
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 WAL
.
10.
Database security IX : status and prospects : proceedings of the ninth annual IFIP TC11 workshop conference on database security, August 1995
Spooner , David L . ...et al
by
Spooner, David L
Publication details:
London
Chapman and Hall
1996
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SPO
.
11.
Digital contagions : a media archaeology of computer viruses
Jussi Parikka
Publication details:
Bern, Switzerland
Lang
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PAR.44
.
12.
Firewall fundamentals
Wes Noonan, Ido Dubrawsky
by
Noonan, Wesley J
Dubrawsky, Ido
Publication details:
Indianapolis, IN
Cisco Press
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 NOO
.
13.
Firewall: checkpoint Ng Vpn-1, ultimate reference
Robert J. Shimonski, Debra Shinder, Anne Henmi
by
Shimonski, Robert J
Henmi, Anne
Shinder, Debra
Publication details:
New York
Dreamtech Press
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SHI
.
14.
FISMA certification & accreditation handbook
BY Laura Taylor; Matthew Shepherd
by
Taylor, Laura
Shepherd, Matthew
Publication details:
Rockland
Syngress
C2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 TAY
.
15.
Handbook of security, cryptography and digital signature
P.Ramachandran S.M. Bhaskar
by
Ramachandran, P
Bhaskar, SM
Publication details:
New Delhi
Viva books private ltd
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BHA
.
16.
Hardware hacking: have fun while voiding your warranty
Joe Grand, .... [et...al]
by
Grand, Joe
Publication details:
Rockland, MA
Syngress
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 GRA
.
17.
Insider threat : protecting the enterprise from sabotage, spying, and theft
Eric Cole; Sandra Ring
by
Cole, Eric
Ring, Sandra
Publication details:
Rockland
Syngress
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 COL
.
18.
Intrusion prevention and active response: deploying network and host IPS
BY Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, Jake Babbin
by
Rash, Michael Rash
Babbin, Jake
Clark, Graham
Orebaugh, Angela D
Publication details:
Rockland
Syngress
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 RAS
.
19.
Configuring SonicWALL firewalls
Dan Bendell; ScienceDirect (Online service); et al
by
Bendell, Dan
Publication details:
Rockland
Syngress Pub
C2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 LAT
.
20.
Cybersecurity operations handbook
John W Rittinghouse; Bill Hancock
by
Rittinghouse, John W
Hancock, Bill
Publication details:
Amsterdam ; Boston
Elsevier Digital Press
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 RIT
.
21.
Guide to computer forensics and investigations
Amelia Philips, Bill Nelson, Chris Steuart
by
Nelson, Bill
Philips, Amelia
Steuart, Chris
Edition:
4th ed
Publication details:
Boston, MA
Cengage Learning
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 NEL
.
22.
Active directory disaster recovery
Florian Rommel
by
Rommel, Florian
Publication details:
New Delhi
SPD
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 ROM
.
23.
No cover image available
Audit and trace log management: consolidation and analysis
Phillip Q. Maier
by
Maier, Phillip Q
Publication details:
Boca Raton, FL
Auerbach Publications
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MAI
.
24.
Security engineering a guide to building dependable distributed system
Ross J. Anderson
by
Anderson, Ross J
Edition:
2nd ed.
Language:
English
Publication details:
New Delhi
Wiley India Pvt. Ltd.
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 AND
.
25.
Blockchain quickstart guide
Kalpesh Parikh and Amit Johri
explore cryptography, cryptocurrency, distributed ledger, hyperledger fabric, ethereum, smart contracts and dApps
by
Parikh, Kalpesh
Johri, Amit
Edition:
1st ed.
Language:
English
Publication details:
New Delhi
Bpb Publications
2022
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
005.8 PAR, ..
.
26.
Financial Cybersecurity Risk Management
/Paul Rohmeyer, Jennifer L. Bayuk ; foreword by Dr. Larry Ponemon.
Leadership Perspectives and Guidance for Systems and Institutions
by
Rohmeyer, Paul
Edition:
1st edition
Publication details:
Berkeley
Apress
reprint 2023
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
658.1 ROH, ..
.
Pages
Find us on the map
Powered by
Koha