Your search returned 54 results.

Not what you expected? Check for suggestions
Sort
Results
Technology and the law on the use of force: new security challenges in the twenty- first century/ Jackson Maogoto

by Maogoto, Jackson.

Series: Routledge research in international lawMaterial type: Text Text Publication details: London: Routledge, 2014Availability: Items available for loan: Central Library, Sikkim University (1) Call number: 341.63 MAO/T.

Responsive security: be ready to be secure/ Meng-Chow Kang.

by Kang, Meng-Chow.

Material type: Text Text Publication details: Boca Raton: CRC Press, 2014Availability: Items available for loan: Central Library, Sikkim University (1) Call number: 658.478 KAN/R.

Electronic commerce: a managerial and social networks perspective/ Efraim Turban, David King, Jae Kyu Lee, Ting-Peng Liang and Deborrah C. Turban

by Turban, Efraim | King, David | Lee, Jae Kyu | Liang, Ting-Peng | Turban, Deborrah C.

Series: (Springer texts in business and economics)Edition: 8th ed.Material type: Text Text Publication details: New York: Springer, 2015Availability: Items available for loan: Central Library, Sikkim University (1) Call number: 658.872 TUR/E.

Computer networks : a top-down approach/ Behrouz A. Forouzan and Firouz Mosharraf.

by Forouzan, Behrouz A.

Edition: 1st ed.Material type: Text Text Publication details: New York, NY : McGraw-Hill, c2012Availability: Items available for loan: Central Library, Sikkim University (1) Call number: 004.6 FOR/C.

Computer networking: a top-down approach / James F. Kurose, Keith W. Ross

by Kurose, James F.

Edition: 7th ed.Material type: Text Text Publication details: Boston; Pearson, 2017Availability: Items available for loan: Central Library, Sikkim University (1) Call number: 004.6 KUR/C.

IoT fundamentals: networking technologies, protocols, and use cases for the Internet of things/ David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry

by Hanes, David | Salgueiro, Gonzalo | Grossetete, Patrick | Barton, Robert | Henry, Jerome.

Publication details: Noida: Pearson Education, 2019Availability: Items available for loan: Central Library, Sikkim University (3) Call number: 004.678 HAN/I, ...

Internet of Things K.G. Srinivasa, Siddesh G.M., Hanumantha Raju R.

by Srinivasa, K.G | G.M, Siddesh | R., Hanumantha Raju.

Edition: 2nd ed. Publication details: New Delhi: Cengage Learning, 2019Availability: Items available for loan: Central Library, Sikkim University (3) Call number: 004.678 SRI/I, ...

Internet of things/ Shriram K Vasudevan, Abhishek S Nagarajan, RMD Sundaram

by Vasudevan, Shriram K | Nagarajan, Abhishek S | Sundaram, RMD.

Publication details: New Delhi: Wiley, 2019Availability: Items available for loan: Central Library, Sikkim University (1) Call number: 004.678 VAS/I.

A machine learning approach to phishing detection and defense/ Iraj Sadegh Amiri

by Amiri, Iraj Sadegh.

Material type: Text Text Publication details: Elsevier, 2015Online access: Click here to access online Availability: Items available for reference: Central Library, Sikkim University Not for loan (1) .

DNS security/ Allan Liska

by Liska, Allan.

Material type: Text Text Publication details: Elsevier, 2016Online access: Click here to access online Availability: Items available for reference: Central Library, Sikkim University Not for loan (1) .

Introduction to network security : theory and practice / Jie Wang, Department of Computer Science at the University of Massachusetts Lowell and Zachary A. Kissel, Department of Computer Science at Merrimack College in North Andover, MA.

by Wang, Jie, 1961- | Kissel, Zachary A.

Material type: Text Text Publication details: Second edition. ; Hoboken, NJ : Singapore : Wiley ; HEP, 2015Online access: Wiley Online Library Availability: Items available for reference: Central Library, Sikkim University Not for loan (1) .

Network attacks and exploitation : a framework / Matthew Monte.

by Monte, Matthew [author.].

Material type: Text Text Publication details: Indianapolis, IN : Wiley, 2015; ©2015Other title: Network attacks & exploitation.Online access: Wiley Online Library Availability: Items available for reference: Central Library, Sikkim University Not for loan (1) .

Artificial immune system : applications in computer security / Ying Tan.

by Tan, Ying, 1964- [author.].

Material type: Text Text Publication details: Hoboken : John Wiley & Sons Inc., 2016Online access: Wiley Online Library Availability: Items available for reference: Central Library, Sikkim University Not for loan (1) .

Network forensics / Ric Messier.

by Messier, Ric [author.].

Material type: Text Text Publication details: Indianapolis, IN : Wiley, 2017Online access: Wiley Online Library Availability: Items available for reference: Central Library, Sikkim University Not for loan (1) .

Pages
SIKKIM UNIVERSITY
University Portal | Contact Librarian | Library Portal

Powered by Koha