Search again

Found: 8  Titles

Order by :    Show:   Per Page
image
Computer and communications security : strategies for the 1990s /
Author
Cooper, James Arlin.
Published
Intertext Pub.,
Call Number
QA76.9.A25 C777
Location
Central Library

image
Computer security basics /
Author
Russell, Deborah.
Published
O'Reilly & Associates,
Call Number
QA76.9.A25 R962
Location
Central Library

image
Computer security handbook /
Author
Baker, Richard H.
Published
Tab Professional and Reference Books,
Call Number
QA76.9.A25 B168 1991
Location
Central Library

image
Computer security reference book /
Published
CRC Pr.,
Call Number
QA76.9.A25 C738
Location
Central Library

image
Network world : network security secrets /
Author
Stang, David J.
Published
IDG Books,
Call Number
QA76.9.A25 S785
Location
Central Library

image
Practical UNIX security /
Author
Garfinkel, Simson.
Published
O'Reilly & Associates,
Call Number
QA76.9.A25 G231

image
Preventing computer fraud /
Author
Stern, Dana L.
Published
McGraw-Hill,
Call Number
HV6773 S839
Location
Central Library

image
SQL Injection prevention using machine learning /
Author
Krit Kamtuo.
Published
Master of Science Thesis in Information Technology, Graduate School, Khon Kaen University,
Call Number
THE365
Location
Central Library

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles