Search again

Found: 20  Titles

Order by :    Show:   Per Page
image
ASP/MIS/ADSI : Web security /
Author
Harrison, Richard.
Published
Prentice Hall PTR,
Call Number
TK5105.59 H321
Location
Central Library

image
Computer security, privacy, and politics : current issues, challenges, and solutions /
Published
IRM Press,
Call Number
QA76.9.A25 C738C
Location
Central Library

image
Cryptography and network security /
Author
Kahate, Atul.
Published
Tata McGraw-Hill Pub.,
Call Number
TK5105.59 K12
Location
Central Library

image
Cryptography and network security : principles and practice /
Author
Stallings, William.
Published
Prentice Hall,
Call Number
TK5105.59 S782 2003
Location
Central Library

image
Cryptography and network security : principles and practice /
Author
Stallings, William.
Published
Prentice Hall,
Call Number
TK5105.59 S782 1999
Location
Central Library

image
CWSP guide to wireless security /
Author
Ciampa, Mark D.
Published
Thomson Course Technology,
Call Number
TK5105.78 C565
Location
Central Library

image
Hack proofing your network : internet tradecraft.
Published
Syngress,
Call Number
TK5105.59 H123
Location
Central Library

image
Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions /
Published
McGraw-Hill,
Call Number
QA76.9.A25 H118
Location
Central Library
Nong Khai Campus Library

image
Handbook of information security /
Published
Wiley,
Call Number
TK5105.59 H236 2006
Location
Central Library

image
Handbook of Research on Advancing Cybersecurity for Digital Transformation /
Author
Sandhu, Kamaljeet,
Call Number
QA76.9.A25 H236 2021
Location
Central Library

image
Intranet security /
Author
Vacca, John R.
Published
Charles River Media,
Call Number
TK5105.59 V113
Location
Central Library

image
Mastering network security /
Author
Brenton, Chris.
Published
SYBEX,
Call Number
QA76.9.A25 B839 2003
Location
Central Library

image
Network security in the' 90s : issues and solutions for managers /
Author
Madron, Thomas W.
Published
Wiley,
Call Number
TK5105.59 M183
Location
Central Library

image
Preserving privacy in data outsourcing /
Author
Foresti, Sara.
Published
Springer,
Call Number
QA76.9.A25 F718
Location
Central Library

image
Risk, complexity and ICT /
Published
E. Elgar,
Call Number
T58.64 R595
Location
Central Library

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles