Search again

Found: 8  Titles

Order by :    Show:   Per Page
image
Cloud management and security /
Author
Abbadi, Imad M.
Published
John Wiley & Sons Inc.,
Call Number
QA76.585 A122 2014
Location
Nong Khai Campus Library

image
Computer and communications security : strategies for the 1990s /
Author
Cooper, James Arlin.
Published
Intertext Pub.,
Call Number
QA76.9.A25 C777
Location
Central Library

image
Computer security basics /
Author
Russell, Deborah.
Published
O'Reilly & Associates,
Call Number
QA76.9.A25 R962
Location
Central Library

image
Computer security reference book /
Published
CRC Pr.,
Call Number
QA76.9.A25 C738
Location
Central Library

image
Handbook of Research on Advancing Cybersecurity for Digital Transformation /
Author
Sandhu, Kamaljeet,
Call Number
QA76.9.A25 H236 2021
Location
Central Library

image

image
SQL injection attacks and defense
Author
Clarke, Justin.
Published
Syngress,

image
SQL Injection prevention using machine learning /
Author
Krit Kamtuo.
Published
Master of Science Thesis in Information Technology, Graduate School, Khon Kaen University,
Call Number
THE365
Location
Central Library

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles