Your search returned 54 results.

Sort
Results
Law and emerging technology : cyber law

by Goel, Hemant.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Haryana: New Era Law Publications, 2004Availability: Items available for loan: Presidency University Library (2) . Location(s): Law Call number: 343.0999 GOE.

Information technology law

by Lioyd, Ian J.

Edition: 7th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi: Oxford University Press, 2014Availability: Not available: Checked out (1).

Information technology law

by Lloyd, Ian J.

Edition: 8th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi: Oxford University Press, 2017Availability: Items available for loan: Presidency University Library (2) . Location(s): Law Call number: 343.0999 LLO.

Security in computing

by Pfleeger, Charles P | Margulies, Jonathan | Pfleeger, Shari Lawrence.

Edition: 5th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Noida: Pearson, 2015Availability: Items available for loan: Presidency University Library (5) . Location(s): Computer Science Engineering Call number: 005.8 PFL.

Full stack developer : your essential guide to the everyday skills expected of a modern full stack web developer

by Northwood, Chris.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York: Apress, 2018Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 006.76 NOR.

Lecture on cyber law : information technology act 2000

by Padmavathi, L.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Hyderabad: Asia Law House, 2015Availability: Items available for loan: Presidency University Library (1) . Location(s): Law Call number: 343.0999 PAD.

Digital defense : what you should know about protecting your company's assets

by Parenty, Thomas J.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston: Harvard Business School Press, 2003Availability: Items available for loan: Presidency University Library (1) . Location(s): Management Call number: 658.478 PAR.

Commentary on information technology act : along with rules, regulations, orders, guidelines, reports and policy documents

by Gupta, Apar | Sapre, Akshay.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Haryana: Lexis Nexis, 2016Availability: Items available for loan: Presidency University Library (1) . Location(s): Law Call number: 343.0999 GUP.

Information technology : law and practice

by Sharma, Vakul | Sharma, Seema.

Edition: 6th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Gurgaon: LexisNexis, 2020Availability: Not available: Checked out (1).

Information technology act, 2000 (Act 21 of 2000) : bare act with short comments

by Professional Book Pulishers [Corporate Author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi: Professional book pulishers, 2020Availability: Items available for loan: Presidency University Library (1) . Not available: Checked out (4). Location(s): Law Call number: 340 BAR INF.

Mobile phone security and forensics : a practical approach

by Androulidakis, Iosif I.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: London: Springer, 2016Availability: Items available for loan: Presidency University Library (3) . Location(s): Electronics and Communication Engineering Call number: 621.38456 AND.

Data protection : ensuring data availability

by De Guise, Preson.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York: CRC Press, 2020Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 DEG.

Data protection : ensuring data availability

by De Guise, preston.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: London: CRC Press, 2017Availability: Items available for loan: Presidency University Library (2) . Location(s): Computer Science Engineering Call number: 005.8 DEG.

Cyber law simplified

by Sood, Vivek.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi: McGraw Hill Education, 2019Availability: Not available: Checked out (1).

Modern data protection : ensuring recoverability of all modern workloads

by Preston, W Curtis.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Mumbai: Shroff Publishers and Distributors, 2021Availability: Items available for loan: Presidency University Library (1) . Location(s): Management Call number: 005.8 PRE.

Cyber laws : a guide to cyber laws, information technology, computer software, intellectual property rights, e-commerce, taxation, privacy, etc., along with policies, guidelines, and agreements

by Singh , Yatindra.

Edition: 6th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Gurgaon: Lexis Nexis, 2021Availability: Items available for loan: Presidency University Library (1) . Location(s): Law Call number: 343.0999 SIN.

Internet law : regulating cyberspace and emerging technologies

by Ryder, Rodney D | Naren, Nikhil | Misra, Dipak [Forwarder].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi: Bloomsbury Publishing, 2020Availability: Items available for loan: Presidency University Library (1) . Location(s): Law Call number: 343.09944 RYD.

Study on testdata protection in India

by Gopalakrishnan, N S | Kadavan, Benoy K.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Lucknow: EBC Publishing, 2005Availability: Items available for loan: Presidency University Library (1) . Location(s): Pure Sciences; Biology Call number: 346.048 GOP.

Investigating European fraud in the EU member states

by Bernardi, Alessandro [Editor] | Negri, Daniele [Editor].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Oxford: Hart Publishing, 2019Availability: Items available for loan: Presidency University Library (1) . Location(s): Law Call number: 345.24 BER.

Protecting personal information : the right to privacy reconsidered

by Monti, Andrea | Wacks, Raymond.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Oxford: Hart Publishing, 2020Availability: Items available for loan: Presidency University Library (1) . Location(s): Law Call number: 342.0858 MON.

Fundamental right to data protection : normative value in the context of counter-terrorism surveillance

by Tzanou, Maria.

Series: Modern studies in European lawMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: London: Hart Publishing, 2019Availability: Items available for loan: Presidency University Library (1) . Location(s): Law Call number: 342.0662 TZA.

Data profiling and insurance law

by McGurk, Brendan.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: London: Hart Publishing, 2020Availability: Items available for loan: Presidency University Library (1) . Location(s): Law Call number: 346.086 MCG.

Penetration testing fundamentals : a hands-on guide to reliable security audits

by Easttom, Chuck.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Noida: Pearson India Education, 2018Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 EAS.

Risk-based approach to data protection

by Gellert, Raphael.

Series: Oxford data protection & privacy lawMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Oxford: Oxford Univeristy Press, 2020Availability: Items available for loan: Presidency University Library (1) . Location(s): Law Call number: 346.048 GEL.

New technologies and EU law

by Cremona, Marise [Editor] | Azoulai, Loic [Series Editor] | Bhuta, Nehal [Series Editor] | Cremona, Marise [Series Editor].

Series: The Collected Courses of the Academy of European LawMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Oxford: Oxford University Press, 2017Availability: Items available for loan: Presidency University Library (1) . Location(s): Law Call number: 341.2422 CRE.

Introduction to computer networks and cybersecurity

by Wu, Chwan-Hwa (John) | Irwin, J. David.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boca Raton: CRC Press, 2014Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 WUC.

Asset attack vectors: building effective vulnerability management strategies to protect organizations

by Haber, Morey J.; Hibbert, Brad.

Material type: Text Text Publication details: New York Apress 2022Availability: Items available for loan: Presidency University Library (3) . Location(s): Computer Science Engineering Call number: 005.8 HAB.

Advanced API security : oauth 2.0 and beyond

by Siriwardena, Prabath.

Material type: Text Text Publication details: New York: Apress , 2022Availability: Items available for loan: Presidency University Library (2) . Location(s): Computer Science Engineering Call number: 005.3 SIR.

Financial cybersecurity risk management : leadership perspectives and guidance for systems and institutions

by Rohmeyer, Paul | Bayuk, Jennifer L.

Material type: Text Text Publication details: New York: Apress , 2022Availability: Items available for loan: Presidency University Library (3) . Location(s): Management Call number: 658. 58 ROH.

Building secure firmware : armoring the foundation of the platform

by Yao, Jiewen ; Zimmer, Vincent.

Material type: Text Text Publication details: New York Apress 2022Availability: Items available for loan: Presidency University Library (3) . Location(s): Computer Science Engineering Call number: 005.8 YAO.

Big breaches : cybersecurity lessons for everyone

by Daswani, Neil ; Elbayadi, Moudy.

Material type: Text Text Publication details: New York Apress 2022Availability: Items available for loan: Presidency University Library (3) . Location(s): Computer Science Engineering Call number: 005.8 DAS.

Identity attack vectors : implementing an effective identity and access management solution

by Haber, Morey J | Rolls, Darran.

Series: For professionals by professionalsMaterial type: Text Text Publication details: New York: ; Apress / KP, ; 2023Availability: Items available for loan: Presidency University Library (3) . Location(s):  CSE Call number: 005.8 HAB.

Privileged attack vectors : building effective cyber-defense strategies to protect organizations

by Haber, Morey J.

Edition: 2nd ed.Material type: Text Text Publication details: New York : Apress, 2023Availability: Items available for loan: Presidency University Library (3) . Location(s): Computer Science Engineering Call number: 005.8 HAB.

Oracle incident response and forensics : preparing for and responding to data breaches

by Finnigan, Pete.

Series: For professionals by professionalsMaterial type: Text Text Publication details: New York: Apress , 2019Availability: Items available for loan: Presidency University Library (3) . Location(s): Call number: 005.74 FIN.

Solving Identity Management in Modern Applications : Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0

by Wilson, Yvonne | Hingnikar, Abhishek.

Material type: Text Text Publication details: New york: ; Apress, ; 2019Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 WIL.

Serverless security : understand, assess, and implement secure and reliable applications in aws, microsoft azure, and google cloud

by Calles, Miguel A.

Material type: Text Text Publication details: New york: ; Apress, ; 2020Availability: Items available for loan: Presidency University Library (3) . Location(s): Computer Science Engineering Call number: 005.8 CAL.

Rational cybersecurity for business : the security leaders' guide to business alignment

by Blum, Daniel J.

Material type: Text Text Publication details: New york: ; Apress, ; 2020Availability: Items available for loan: Presidency University Library (3) . Location(s): Computer Science Engineering Call number: 005.8 BLU.

Complete book of data anonymization : from planning to implementation

by Raghunathan, Balaji.

Material type: Text Text Publication details: Boca Raton: ; CRC Press, ; 2013Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 RAG.

Cyber security : Understanding cyber crimes, computer forensics and legal perpectives

by Godbole, Nina | Belapure, Sunit.

Material type: Text Text Publication details: New Delhi Wiley 2023Availability: Not available: Checked out (1).

Managing risk and information security : Protect to enable

by Harkins, Malcolm.

Material type: Text Text Publication details: New York: Apress , 2023Availability: Items available for loan: Presidency University Library (3) . Location(s): Computer Science Engineering Call number: 005.8 HAR.

Computer security and cryptography

by O'Brein,Nessa [Editor].

Material type: Text Text Publication details: New Yark: Larsen and Keller, 2023Availability: Items available for loan: Presidency University Library (2) . Location(s): Computer Science Engineering Call number: 005.8 OBR.

Embedded systems security : practical methods for safe and secure software and systems development

by Kleidermacher, David | Kleidermacher, Mike.

Material type: Text Text Publication details: London : ELSEVIER, 2012Availability: Items available for loan: Presidency University Library (6) . Location(s): Computer Science Engineering Call number: 006.22 KLE.

Can banks still keep a secret? : bank secrecy in financial centres around the world

by Booysen, Sandra [Editor] | Neo, Dora [Editor].

Material type: Text Text Publication details: Cambridge: Cambridge University Press, 2018Availability: Items available for loan: Presidency University Library (1) . Location(s): Law Call number: 346.082 BOO.

Targeted : my inside story of Cambridge Analytica and how Trump, Brexit and Facebook broke democracy

by Kaiser, Brittany.

Material type: Text Text Publication details: London : HarperCollins Children's Books., 2019Availability: Items available for loan: Presidency University Library (1) . Location(s): Social Sciences Call number: 324.702854678 KAI.

Azure cloud security for absolute beginners : enabling cloud infrastructure security with multi-level security options

by Herath, Pushpa.

Material type: Text Text Publication details: New York: Apress, 2023Availability: Items available for loan: Presidency University Library (2) . Location(s): Computer Science Engineering Call number: 005.8 HER.

Understand, manage, and measure cyber risk : practical solutions for creating a sustainable cyber program

by Leirvik, Ryan.

Material type: Text Text Publication details: New York: Apress, 2022Availability: Items available for loan: Presidency University Library (2) . Location(s): Computer Science Engineering Call number: 005.8 LEI.

Pro google cloud automation : with google cloud deployment manager, spinnaker, tekton, and jenkins

by Sabharwal, Navin | Pandey, Piyush.

Material type: Text Text Publication details: New York: Apress, 2021Availability: Items available for loan: Presidency University Library (2) . Location(s): Computer Science Engineering Call number: 004.6782 SAB.

It governance and information security : guides, standards and frameworks

by Maleh, Yassine | Alazab, Mamoun | Belaissaoui, Mustapha | El-Latif, Ahmed A. Abd [Series Editor] | Maleh, Yassine [Series Editor] | Sahid, Abdelkebir.

Material type: Text Text Publication details: Boca Raton: CRC Press Taylor and Francis Group, 2022Availability: Items available for loan: Presidency University Library (2) . Location(s): Computer Science Engineering Call number: 005.8 MAL.

Information security : principles and practice

by Stamp, Mark.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Jersey : John Willey & Sons ltd, 2022Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 STA.

Cyber security policy guidebook

by Bayuk, Jennifer L | Healey, Jason | Rohmeyer, Paul | Sachs, Marcus H.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Jersey : John Willey & Sons ltd, 2010Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 BAY.

Security and usability : designing secure systems that people can use

by Cranor, Lorrie Faith [Editor] | Cranor, Lorrie Faith [Editor].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Sebastopol : Shroff Publishers, 2005Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 CRA.

Hadoop security : protecting your big data problem

by Spivey, Ben | Echeverria, Joey.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Sebastopol : O'Reilly Media Inc, 2015Availability: Items available for loan: Presidency University Library (3) . Location(s): Computer Science Engineering Call number: 005.74 SPI.

Building an anonymization pipeline : creating safe data

by Arbuckle, Luk | El Emam, Khaled.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Sebastopol : O'Reilly Media Inc, 2020Availability: Items available for loan: Presidency University Library (1) . Location(s): Computer Science Engineering Call number: 005.8 ARB.

Data protection : law and regulation

by Apurv Sardeshmukh.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Gurgaon : Thomson Reuters South Asia Private Limited, 2019Availability: Items available for loan: Presidency University Library (1) . Location(s): Law Call number: 342.5408 APU.

Pages

© Copyright 2017 by Presidency University. All Rights Reserved.