Search again

Found: 25  Titles

Order by :    Show:   Per Page
image
Computer communications security : principles, standard protocols and techniques /
Author
Ford, Warwick.
Published
Prentice Hall,
Call Number
QA76.9.A25 F711
Location
Central Library

image
Computer security, privacy, and politics : current issues, challenges, and solutions /
Published
IRM Press,
Call Number
QA76.9.A25 C738C
Location
Central Library

image
Computer system and network security /
Author
White, Gregory B.
Published
CRC Pr.,
Call Number
QA76.9.A25 W584
Location
Central Library

image
Cryptography and network security : principles and practice /
Author
Stallings, William.
Published
Prentice Hall,
Call Number
TK5105.59 S782 2003
Location
Central Library

image
Cryptography and network security : principles and practice /
Author
Stallings, William.
Published
Prentice Hall,
Call Number
TK5105.59 S782 1999
Location
Central Library

image
Disaster proofing information systems : a complete methodology for eliminating single points of failure /
Author
Buchanan, Robert W.,
Published
McGraw-Hill,
Call Number
QA76.9.D348 B918
Location
Central Library

image
Fundamentals of information systems security /
Author
Kim, David.
Published
Jones & Bartlett Learning,
Call Number
QA76.9.A25 K49
Location
Central Library

image
Guide to Linux networking and security /
Author
Wells, Nicholas.
Published
Thomson/Course Technology,
Call Number
QA76.76.O63 W455
Location
Central Library
Engineering Library

image
Hack proofing your network : internet tradecraft.
Published
Syngress,
Call Number
TK5105.59 H123
Location
Central Library

image
Handbook of Research on Advancing Cybersecurity for Digital Transformation /
Author
Sandhu, Kamaljeet,
Call Number
QA76.9.A25 H236 2021
Location
Central Library

image
Information systems security : a practitioner's reference /
Author
Fites, Philip E.
Published
Van Nostrand Reinhold,
Call Number
QA76.9.A25 F546
Location
Central Library

image
Information technology security & risk management /
Author
Slay, Jill.
Published
Wiley,
Call Number
QA76.9.A25 S631 2006
Location
Central Library
Nong Khai Campus Library

image
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks /
Author
Brancik, Kenneth C.
Published
Auerbach Publications,
Call Number
QA76.9.A25 B816
Location
Central Library

image
Internet security : risk analysis, strategies and firewalls /
Author
Kyas, Othmar.
Published
International Thomson Computer Pr.,
Call Number
TK5105.59 K99
Location
Central Library

image
Introduction to cryptography with open-source software /
Author
McAndrew, Alasdair.
Published
CRC Press,
Call Number
QA76.9.A25 M114
Location
Central Library

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles