Your search returned 29 results.

Sort
Results
Digital defense : what you should know about protecting your company's assets

by Parenty, Thomas J.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston: Harvard Business School Press, 2003Availability: Items available for loan: Presidency University Library (1) . Location(s): Management Call number: 658.478 PAR.

Network security : the complete reference

by Bragg, Roberta | Rhodes-Ousley, Mark | Strassberg, Keith.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Chennai: Mcgraw Hill Education, 2016Availability: Items available for loan: Presidency University Library (5) . Items available for reference: Presidency University Library Access Restricted (5) . Location(s): Computer Science Engineering Call number: 005.8 BRA.

Network security : private communication in a public world

by Kaufman, Charlie | Perlman, Radia | Speciner, Mike.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi: Pearson India, 2016Availability: Items available for loan: Presidency University Library (5) . Location(s): Computer Science Engineering Call number: 005.8 KAU.

Penetration testing fundamentals : a hands-on guide to reliable security audits

by Easttom, Chuck.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Noida: Pearson India Education, 2018Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 EAS.

Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies

by Parker, Carey.

Edition: 3rd ed.Material type: Text Text Publication details: New York Apress 2019Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 PAR.

Pro iOS security and forensics : enterprise iphone and iPad safety

by Butow, Eric.

Series: For professionals by professionalsMaterial type: Text Text Publication details: New York: ; Apress / KP, ; 2022Availability: Items available for loan: Presidency University Library (3) . Location(s): Computer Science Engineering Call number: 005.8 BUT.

Privileged attack vectors : building effective cyber-defense strategies to protect organizations

by Haber, Morey J.

Edition: 2nd ed.Material type: Text Text Publication details: New York : Apress, 2023Availability: Items available for loan: Presidency University Library (3) . Location(s): Computer Science Engineering Call number: 005.8 HAB.

Open source intelligence methods and tools : a practical guide to online intelligence

by Hassan, Nihad A | Hijazi, Rami.

Series: For professionals by professionalsMaterial type: Text Text Publication details: New York: ; Apress / KP, ; 2021Availability: Items available for loan: Presidency University Library (3) . Location(s): Computer Science Engineering Call number: 005.8 HAS.

Pro spring security : securing spring framework 5 and boot 2based java applications

by Scarioni, Carlo | Nardone, Massimo.

Series: For professionals by professionalsEdition: 2nd ed.Material type: Text Text Publication details: New York: ; Apress / KP, ; 2022Availability: Items available for loan: Presidency University Library (3) . Location(s): Call number: 005.3 SCA.

Serverless security : understand, assess, and implement secure and reliable applications in aws, microsoft azure, and google cloud

by Calles, Miguel A.

Material type: Text Text Publication details: New york: ; Apress, ; 2020Availability: Items available for loan: Presidency University Library (3) . Location(s): Computer Science Engineering Call number: 005.8 CAL.

Rational cybersecurity for business : the security leaders' guide to business alignment

by Blum, Daniel J.

Material type: Text Text Publication details: New york: ; Apress, ; 2020Availability: Items available for loan: Presidency University Library (3) . Location(s): Computer Science Engineering Call number: 005.8 BLU.

Computer system and network security

by White, Gregory B | Fisch, Eric A | Pooch, Udo W.

Material type: Text Text Publication details: Boca Raton: ; CRC Press, ; 1996Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 WHI.

Zero trust security : an enterprise guide

by Garbis, Jason.

Material type: Text Text Publication details: New York: Apress , 2021Availability: Items available for loan: Presidency University Library (3) . Location(s): Computer Science Engineering Call number: 005.8 GAR.

Security in the private cloud

by Vacca, John R [Editor].

Material type: Text Text Publication details: Boca Raton: CRC Press Taylor & Francis Group, 2023Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 004.6782 VAC.

Cyber security : Understanding cyber crimes, computer forensics and legal perpectives

by Godbole, Nina | Belapure, Sunit.

Material type: Text Text Publication details: New Delhi Wiley 2023Availability: Not available: Checked out (1).

Integrated security technologies and solutions : Cisco Security Solutions for advanced threat protection with next generation firewall, intrusion prevention, AMP, and content security - Vol. 1

by Woland, Aaron T | Harris, Mason | Sanbower, Jamie | Santuka, Vivek.

Material type: Text Text Publication details: Noida: Pearson, 2022Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 WOL.

Cybersecurity incident response : how to contain, eradicate, and recover from incidents

by Thompson, Eric C.

Series: For Professionals by professionalsMaterial type: Text Text Publication details: Berkeley, California: Apress,. 2018Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 THO.

Computer and cyber security : principles, algorithm, applications, and perspectives

by Gupta, Brij B [Editor] | Agrawal, Dharma P [Editor] | Wang, Haoxiang [Editor].

Material type: Text Text Publication details: Boca Raton: CRC Press,. 2022Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 GUP.

Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies

by Parker, Carey.

Material type: Text Text Publication details: New York: Apress , 2019Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 PAR.

Cyber security on azure : an IT professional’s guide to microsoft azure security

by Copeland, Marshall | Jacobs, Matthew.

Edition: 2nd ed.Material type: Text Text Publication details: New York: Apress, 2023Availability: Items available for loan: Presidency University Library (2) . Location(s): Computer Science Engineering Call number: 005.8 COP.

Cyber operations : building, defending, and attacking modern computer networks

by O'Leary, Mike.

Edition: 2nd ed.Material type: Text Text Publication details: New York: Apress, 2023Availability: Items available for loan: Presidency University Library (2) . Location(s): Computer Science Engineering Call number: 005.8 OLE.

Understand, manage, and measure cyber risk : practical solutions for creating a sustainable cyber program

by Leirvik, Ryan.

Material type: Text Text Publication details: New York: Apress, 2022Availability: Items available for loan: Presidency University Library (2) . Location(s): Computer Science Engineering Call number: 005.8 LEI.

Cyber threat intelligence : the no-nonsense guide for CISOs and Security Managers

by Roberts, Aaron.

Material type: Text Text Publication details: London: Apress, 2023Availability: Items available for loan: Presidency University Library (2) . Location(s): Computer Science Engineering Call number: 005.8 ROB.

Security intelligence : a practitioner's guide to solving enterprise security challenges

by Qing, Li | Clark, Gregory.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Canada : John Wiley & Sons Inc, 2015Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 QUI.

Learning kali linux : security testing, penetration testing, and ethical hacking

by Messier, Ric.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Sebastopol : Shroff Publishers, 2018Availability: Not available: Checked out (1).

Cybersecurity ops with bash : attack, defend, and analyze from the command line

by Troncone, Paul | Albing, Carl.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Sebastopol : O'Reilly Media Inc, 2019Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 TRO.

Container security : fundamental technology concepts that protect containerized applications

by Rice, Liz.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Sebastopol : O'Reilly Media Inc, 2020Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 LIZ.

Agile application security : enabling security in a continuous delivery pipeline

by Bell, Laura | Smith, Rich | Bird, Jim | Brunton-Spall, Michael.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Sebastopol : O'Reilly Media Inc, 2017Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 BEL.

Internet of risky things : trusting the devices that surround us

by Smith, Sean.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Sebastopol : Shroff Publishers, 2017Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 004.678 SMI.

Pages

© Copyright 2017 by Presidency University. All Rights Reserved.