Search again

Found: 31  Titles

Order by :    Show:   Per Page
image
Computer and communications security : strategies for the 1990s /
Author
Cooper, James Arlin.
Published
Intertext Pub.,
Call Number
QA76.9.A25 C777
Location
Central Library

image
Computer communications security : principles, standard protocols and techniques /
Author
Ford, Warwick.
Published
Prentice Hall,
Call Number
QA76.9.A25 F711
Location
Central Library

image
Computer security basics /
Author
Russell, Deborah.
Published
O'Reilly & Associates,
Call Number
QA76.9.A25 R962
Location
Central Library

image
Computer security handbook /
Author
Baker, Richard H.
Published
Tab Professional and Reference Books,
Call Number
QA76.9.A25 B168 1991
Location
Central Library

image
Computer security reference book /
Published
CRC Pr.,
Call Number
QA76.9.A25 C738
Location
Central Library

image
Computer security, privacy, and politics : current issues, challenges, and solutions /
Published
IRM Press,
Call Number
QA76.9.A25 C738C
Location
Central Library

image
Computer system and network security /
Author
White, Gregory B.
Published
CRC Pr.,
Call Number
QA76.9.A25 W584
Location
Central Library

image
Cryptography and network security : principles and practice /
Author
Stallings, William.
Published
Prentice Hall,
Call Number
TK5105.59 S782 2003
Location
Central Library

image
Cryptography and network security : principles and practice /
Author
Stallings, William.
Published
Prentice Hall,
Call Number
TK5105.59 S782 1999
Location
Central Library

image
Disaster proofing information systems : a complete methodology for eliminating single points of failure /
Author
Buchanan, Robert W.,
Published
McGraw-Hill,
Call Number
QA76.9.D348 B918
Location
Central Library

image
Fundamentals of information systems security /
Author
Kim, David.
Published
Jones & Bartlett Learning,
Call Number
QA76.9.A25 K49
Location
Central Library

image
Guide to Linux networking and security /
Author
Wells, Nicholas.
Published
Thomson/Course Technology,
Call Number
QA76.76.O63 W455
Location
Central Library
Engineering Library

image
Hack proofing your network : internet tradecraft.
Published
Syngress,
Call Number
TK5105.59 H123
Location
Central Library

image
Handbook of Research on Advancing Cybersecurity for Digital Transformation /
Author
Sandhu, Kamaljeet,
Call Number
QA76.9.A25 H236 2021
Location
Central Library

image
Information systems security : a practitioner's reference /
Author
Fites, Philip E.
Published
Van Nostrand Reinhold,
Call Number
QA76.9.A25 F546
Location
Central Library

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles