Search again

Found: 30  Titles

Order by :    Show:   Per Page
image
ASP/MIS/ADSI : Web security /
Author
Harrison, Richard.
Published
Prentice Hall PTR,
Call Number
TK5105.59 H321
Location
Central Library

image
Building Linux Virtual Private Networks (VPNs) /
Author
Kolesnikov, Oleg.
Published
New Riders,
Call Number
TK5105.59 K81

image
Building secure servers with Linux /
Author
Bauer, Michael D.
Published
O'Reilly,
Call Number
TK5105.59 B344 2002

image
Computer security, privacy, and politics : current issues, challenges, and solutions /
Published
IRM Press,
Call Number
QA76.9.A25 C738C
Location
Central Library

image
Cryptography and network security /
Author
Kahate, Atul.
Published
Tata McGraw-Hill Pub.,
Call Number
TK5105.59 K12
Location
Central Library

image
Cryptography and network security : principles and practice /
Author
Stallings, William.
Published
Prentice Hall,
Call Number
TK5105.59 S782 2003
Location
Central Library

image
Cryptography and network security : principles and practice /
Author
Stallings, William.
Published
Prentice Hall,
Call Number
TK5105.59 S782 1999
Location
Central Library

image
CWSP guide to wireless security /
Author
Ciampa, Mark D.
Published
Thomson Course Technology,
Call Number
TK5105.78 C565
Location
Central Library

image
Data communications and network security /
Author
Carr, Houston H.,
Published
McGraw-Hill Irwin,
Call Number
TK5105.59 C311 2007
Location
Nong Khai Campus Library

image
Designing network security /
Author
Kaeo, Merike.
Published
Cisco Pr.,
Call Number
TK5105.59 K11 2004
Location
Nong Khai Campus Library

image
Enterprise Web services security /
Author
Hollar, Rickland,
Published
Charles River Media,
Call Number
TK5105.59 H737
Location
Nong Khai Campus Library

image
Fundamentals of network security lab companion and workbook /
Published
Cisco Pr.,
Call Number
TK5105.59 F981
Location
Nong Khai Campus Library

image
Hack proofing your network : internet tradecraft.
Published
Syngress,
Call Number
TK5105.59 H123
Location
Central Library

image
Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions /
Published
McGraw-Hill,
Call Number
QA76.9.A25 H118
Location
Central Library
Nong Khai Campus Library

image
Handbook of information security /
Published
Wiley,
Call Number
TK5105.59 H236 2006
Location
Central Library

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles