21. Public expenditures, growth, and poverty : lessons from developing countries

by Fan, Shenggen | Fan, Shenggen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Oxford: Oxford University Press, 2008Availability: Items available for loan: [Call number: 339.46091724 FAN] (1).
22. Cybersecurity and cyberwar : what everyone needs to know

by Singer, P. W | Friedman, Allan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Oxford University Press, 2014Availability: Items available for loan: [Call number: 005.8 SIN] (1).
23. Nuclear nightmares : securing the world before it is too late

by Cirincione, Joseph.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Columbia University Press, 2013Availability: Items available for loan: [Call number: 327.1747 CIR] (1).
24. Delicate truth

by Le Carre, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Penguin Books, 2013Availability: Items available for loan: [Call number: 823.914 LEC] (1).
25. Technology of nonviolence : social media and violence prevention

by Bock, Joseph G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2012Availability: Items available for loan: [Call number: 303.61 BOC] (1).
26. Global initiatives to secure cyberspace : an emerging landscape

by Portnoy, Michael | Goodman, Seymour E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 POR] (1).
27. Leakage in nanometer CMOS technologies

by Chandrakasan, Anantha P | Narendra, Siva G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 621.38412 NAR] (1).
28. Vulnerability analysis and defense for the Internet

by Sing, Abhishek | Joseph, Hirosh | Singh, Baibhav.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 SIN] (1).
29. Insider attack and cyber security : beyond the hacker

by Stolfo, Salvatore J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 STO] (1).
30. Future of identity in the information society

by Fischer-Hubner, Simone | IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society | International Federation for Information Processing.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 FIS] (1).
31. Automated Defect Prevention : best practices in software management

by Huizinga, Dorota | Kolawa, Adam.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005 HUI] (1).
32. Schneier on security

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley, 2008Availability: Items available for loan: [Call number: 005.80973 SCH] (1).
33. Making India work

by Bissell, William Nanda.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Penguin Books, 2009Availability: Items available for loan: [Call number: 338.954 BIS] (1).
34. Bankers' new clothes : what's wrong with banking and what to do about it

by Admati, Anat | Hellwig, Martin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Princeton: Princeton University Press, 2013Availability: Items available for loan: [Call number: 332.1 ADM] (1).
35. Investigative data mining for security and criminal detection

by Mena, Jesus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Butterworth-Heinemann, 2003Availability: Items available for loan: [Call number: 005.8 MEN] (1).
36. Adoption of health technologies in India : implications for the AIDS vaccine

by Gupta, Indrani | Kandamuthan, Subodh | Trivedi, Mayur.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Sage Publications, 2007Availability: Items available for loan: [Call number: 615.3720954 GUP] (1).
37. Terrorism and counter-terrorism : ethics and liberal democracy

by Miller, Seumas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Malden: Blackwell, 2009Availability: Items available for loan: [Call number: 363.325 MIL] (1).
38. Combating piracy : intellectual property theft and fraud

by Albanese, Jay S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Brunswick: Transaction Publishers, 2009Availability: Items available for loan: [Call number: 364.163 ALB] (1).
39. Insider threats in cyber security

by Probst, Christian W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
40. Creating a world without poverty : how social business can transform our lives

by Yunus, Muhammad | Weber, Karl.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: PublicAffairs, 2007Availability: Items available for loan: [Call number: 338.7 YUN] (1).

Powered by Koha