NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Your search returned 38 results.

Sort
Results
21.
22.
23.
Asymmetric cryptography : primitives and protocols / coordinated by David Pointcheval. by Series: Sciences (Editions Eshel). Computer science: Cryptography, data security.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: London, UK : Hoboken, NJ : ISTE, Ltd. ; John Wiley & Sons, Inc., 2022
Availability: No items available.

24.
Hacking multifactor authentication / Roger A. Grimes. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, IN : John Wiley & Sons, Inc., [2021]
Availability: No items available.

25.
Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity / Marcus J. Carey & Jennifer Jin. by Series: Tribe of Hackers Ser
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Indianapolis : Wiley, 2020
Availability: No items available.

26.
Implementing cryptography using Python / Shannon W. Bray. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Indianapolis : Wiley, 2020
Availability: No items available.

27.
Cybersecurity and decision makers : data security and digital trust / Marie de Fr�eminville. by Series: Information systems, web and pervasive computing series
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: London : Hoboken, NJ : ISTE Ltd ; John Wiley & Sons, Inc., 2020
Availability: No items available.

28.
Tribe of hackers security leaders : tribal knowledge from the best in cybersecurity leadership / Marcus J. Carey & Jennifer Jin. by Series: Tribe of Hackers Ser
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Newark : John Wiley & Sons, Incorporated, 2020
Availability: No items available.

29.
Hacking connected cars : tactics, techniques, and procedures / Alissa Knight. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, Indiana : John Wiley & Sons, Inc., [2020]
Availability: No items available.

30.
Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto / Roger A. Grimes. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Hoboken, NJ : Wiley, 2020
Availability: No items available.

31.
The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity / Phil Quade. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley, 2019
Availability: No items available.

32.
Tribe of hackers : cybersecurity advice from the best hackers in the world / Marcus J. Carey & Jennifer Jin. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, Indiana : Wiley, [2019]
Availability: No items available.

33.
Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity / Marcus J. Carey and Jennifer Jin. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Newark : John Wiley & Sons, Incorporated, 2019
Availability: No items available.

34.
Artificial immune system : applications in computer security / Ying Tan. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Hoboken : John Wiley & Sons Inc., 2016
Availability: No items available.

35.
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. by
Edition: Second edition, 20th anniversary edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, IN : John Wiley & Sons, [2015]Copyright date: �2015
Other title:
  • Protocols, algorithms, and source code in C
Availability: No items available.

36.
Cryptography engineering : design principles and practical applications / Tadayoshi Kohno, Niels Ferguson, Bruce Schneier. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley Pub., Inc., �2010
Availability: No items available.

37.
Applied cryptanalysis : breaking ciphers in the real world / Mark Stamp, Richard M. Low. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley-Interscience, �2007
Availability: No items available.

38.
Computer security and cryptography / Alan G. Konheim. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley-Interscience, �2007
Availability: No items available.

Pages
© 2022- NLU Meghalaya. All Rights Reserved. || Implemented and Customized by
OPAC Visitors

Powered by Koha