Skip to main content
Koha online
Your cart is empty.
Cart
Lists
Public lists
WISE
joshi shubhangi
Computer Science
Technical communication
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
SNDT WOMEN'S UNIVERSITY
BMK Knowledge Resource Centre
Vithaldas Vidyavihar, Juhu Tara Road,
Santacruz (West) Mumbai - 400049
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog by keyword
Advanced search
Authority search
Tag cloud
Contact
Log in to your account
Card number or username:
Password:
Home
Advanced search
Results of search for 'ccl=su:"Security "', page 2 of 3
Refine your search
Availability
Limit to records with available items
Authors
Aastha Verma
Ankita Singh
Dr.Firas M.Tuaimah
Gollmann, Dieter
Hala M.Abbas
Hassan, Nihad ; Hij...
Heena
Immareddy suhash red...
Jha, Raghbendra ; Ga...
Karthick S
Kaufman, Charlie ; P...
Paritosh pawar
Paula C
Paula C.Useche Muril...
Raju Lal Bhardwaj
Raveendra Podeti
Sam bodjrenou
Sharma, Vidushi ; Jo...
Stallings, William
Subramanian, Chandra...
Show more
Show less
Collections
NTB
Item types
Book
Journal Article
Topics
Algorithms
Blockchain
child nutrition
Commerce and Mana...
Computer Science
Electronics
ENGINEERING
Food Technology
FOOD TECHNOLOGY
General Books (inter...
hackers
MCA
Show more
Show less
Your search returned 52 results.
Sort
First
Previous
1
2
3
Next
Last
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to cart
Add to list
New list
Place hold
Results
21.
Image from Amazon.com
Enhancing IoT securites : a holistic approach to security for connected platforms
by
Sharma, Vidushi ; Joshi, Gamini
Language:
E
Publication details:
New Delhi
BPB Publications
2023
Availability:
Items available for loan:
SNDT Juhu
(1)
Call number:
004.678/Sha/Jos
.
Place hold
Save to lists
Add to cart
(remove)
22.
Recursive Challenge Feed Arbiter Physical Unclonable Function (RC-FAPUF) In 180nm Process For Reliable Key Generation In IOT Security
by
Raveendra Podeti
In:
IETE Technical Review
New Delhi IETE
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
23.
Local cover image
Image from Amazon.com
Food technology and nutrigenomics
by
Sykes, Vincent
Language:
E
Publication details:
USA
Kaufman Press
2022
Availability:
Items available for loan:
SNDT Juhu
(1)
Call number:
664/Syk
.
Place hold
Save to lists
Add to cart
(remove)
24.
Image from Amazon.com
Guide to computer network security
by
Kizza, Joseph M
Edition:
5th ed
Language:
E
Publication details:
Switzerland
Springer
2020
Availability:
Items available for loan:
SNDT Juhu
(1)
Call number:
005.8/Kiz
.
Place hold
Save to lists
Add to cart
(remove)
25.
Security Analysis of Routing protocols for Wireless Sensor Networks
by
Celia John
Charu Wahi
In:
Indian Journal of Information Security and Computer
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
26.
Use of CNNs for follower Mobile agents with safe distance
by
Paula C.Useche Murillo
Robinson Jimenez Moreno
In:
Indian Journal of Modern Wireless & Optical Communication
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
27.
Towards Techniques of Detecting Node Replication Attack in Static Wireless Sensor Network
by
Moirangthem Marjit Singh
Ankita Singh
In:
International Journal of Advanced Software Engineering
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
28.
The RSA challenge urge for Advent of neotic encryption system
by
Amiya chakraborty
In:
Indian Journal of Advance computer & VLSI Design
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
29.
Fog computing to insider data theft attacks in the cloud by using data mining and otp mechanism
by
Paritosh pawar
Manish patil Anu pardeshi L khandekar
In:
Indian Journal of Advance computer & VLSI Design
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
30.
A Comprehensive Analysis of Classifiers to Detect Cross-site Scripting (XSS) Attacks in Web Pages
by
M.Meagala
G.Umamaheswari
In:
Indian Journal of Mathematical Modelling and Applied Computing
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
31.
Effects of eating habits and food components on working efficacy, and attraction level of tribal youths in traditional farming
by
Raju Lal Bhardwaj
Latika Vyas
In:
Indian Journal of Traditional Knowledge
New Delhi NISCAIR
Availability:
Items available for loan:
SNDT Juhu
(2).
Place hold
Save to lists
Add to cart
(remove)
32.
Exploring the role of diverse underutilized nutri-crops on food and nutritional security of ethnic communities in Eastern Himalaya
by
Sujit Sarkar
In:
Indian Journal of Traditional Knowledge
New Delhi NISCAIR
Availability:
Items available for loan:
SNDT Juhu
(3).
Place hold
Save to lists
Add to cart
(remove)
33.
Regional water and food security require joint israeli-palestinian guidelines for wastewater reuse and food safety
by
Evyatar ben mordechay
Ziad abdeen sobhi robeen snir schwartz
In:
Food & Nutrition Bulletin
Sage Publication
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
34.
Do we contribute to women's empowerment insihts from a nutrition-sensitive agriculture project implemented in nong,laos
by
Manon gerber
Danielle M.Bon Bounthanom bouahom
In:
Shauna downs Piloting market food environment assessment and lessons learned
Availability:
No items available.
Save to lists
Add to cart
(remove)
35.
Factors affecting consumption patterns of neglected and underutilized patterns atacora, northern benin
by
Bissola Malikath bankole
Sam bodjrenou Julia bodecker Celine termote
In:
Shauna downs Piloting market food environment assessment and lessons learned
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
36.
Factors Affecting consumption patterns of neglected and underutilized species in atacora,northern benin
by
Bissola malikath bankole,MSc
Sam bodjrenou,Phd Julia bodecker
In:
Food & Nutrition Bulletin
Sage Publication
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
37.
Contextualizing traditional water knowledge with modern water challenges in India: A hydrological review
by
V C Goyal
In:
Indian Journal of Traditional Knowledge
New Delhi NISCAIR
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
38.
Shoulder-surfing resistant graphical password system for cloud
by
Vijaykumari rodda
gangadhar rao kancherla
In:
Indian Journal of Simulation and Wireless Communication
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
39.
Under Wireless Communication System For Large Distance Transmission
by
Immareddy suhash reddy
Ashlesh Upadhyaya
In:
Indian Journal of Signal & Image Processing
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
40.
Trust based secure information exchange betwwen user ang sensor node using authentication method and verified at each gateway node in wireless network
by
D.Srujan chandra reddy
V.V.Sunil kumar
In:
International Journal of Soft Computing Process and Techniques
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
First
Previous
1
2
3
Next
Last
Not finding what you're looking for?
Make a
purchase suggestion