Search again

Found: 47  Titles

Order by :    Show:   Per Page
image
Cloud management and security /
Author
Abbadi, Imad M.
Published
John Wiley & Sons Inc.,
Call Number
QA76.585 A122 2014
Location
Nong Khai Campus Library

image
Computer and communications security : strategies for the 1990s /
Author
Cooper, James Arlin.
Published
Intertext Pub.,
Call Number
QA76.9.A25 C777
Location
Central Library

image
Computer communications security : principles, standard protocols and techniques /
Author
Ford, Warwick.
Published
Prentice Hall,
Call Number
QA76.9.A25 F711
Location
Central Library

image
Computer Security : Principles and Practice /
Author
Stallings, Willam.
Published
Prentice Hall,
Call Number
QA76.9.A25 S782
Location
Nong Khai Campus Library

image
Computer security basics /
Author
Russell, Deborah.
Published
O'Reilly & Associates,
Call Number
QA76.9.A25 R962
Location
Central Library

image
Computer security handbook /
Author
Baker, Richard H.
Published
Tab Professional and Reference Books,
Call Number
QA76.9.A25 B168 1991
Location
Central Library

image
Computer security reference book /
Published
CRC Pr.,
Call Number
QA76.9.A25 C738
Location
Central Library

image
Computer security, privacy, and politics : current issues, challenges, and solutions /
Published
IRM Press,
Call Number
QA76.9.A25 C738C
Location
Central Library

image
Computer system and network security /
Author
White, Gregory B.
Published
CRC Pr.,
Call Number
QA76.9.A25 W584
Location
Central Library

image
Cryptography and network security : principles and practice /
Author
Stallings, William.
Published
Prentice Hall,
Call Number
TK5105.59 S782 2003
Location
Central Library

image
Cryptography and network security : principles and practice /
Author
Stallings, William.
Published
Prentice Hall,
Call Number
TK5105.59 S782 1999
Location
Central Library

image
Cyber security for educational leaders : a guide to understanding and implementing technology policies /
Author
Phillips, Richard,
Published
Routledge,
Call Number
LB1028.3 P562 2013
Location
Education Library

image
Designing network security /
Author
Kaeo, Merike.
Published
Cisco Pr.,
Call Number
TK5105.59 K11 2004
Location
Nong Khai Campus Library

image
Digital signatures /
Author
Katz, Jonathan.
Published
Springer,
Call Number
QA76.9.A25 K19
Location
Central Library

image
Disaster proofing information systems : a complete methodology for eliminating single points of failure /
Author
Buchanan, Robert W.,
Published
McGraw-Hill,
Call Number
QA76.9.D348 B918
Location
Central Library

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles