Search again

Found: 8  Titles

Order by :    Show:   Per Page
image
Computer security, privacy, and politics : current issues, challenges, and solutions /
Published
IRM Press,
Call Number
QA76.9.A25 C738C
Location
Central Library

image
Cryptography and network security : principles and practice /
Author
Stallings, William.
Published
Prentice Hall,
Call Number
TK5105.59 S782 2003
Location
Central Library

image
Cryptography and network security : principles and practice /
Author
Stallings, William.
Published
Prentice Hall,
Call Number
TK5105.59 S782 1999
Location
Central Library

image
Hack proofing your network : internet tradecraft.
Published
Syngress,
Call Number
TK5105.59 H123
Location
Central Library

image
Handbook of Research on Advancing Cybersecurity for Digital Transformation /
Author
Sandhu, Kamaljeet,
Call Number
QA76.9.A25 H236 2021
Location
Central Library

image
Mastering network security /
Author
Brenton, Chris.
Published
SYBEX,
Call Number
QA76.9.A25 B839 2003
Location
Central Library

image
Securing the cloud : cloud computer security techniques and tactics /
Author
Winkler, J. R.
Published
Syngress/Elsevier,
Call Number
QA76.585 W775
Location
Central Library

image
SQL Injection prevention using machine learning /
Author
Krit Kamtuo.
Published
Master of Science Thesis in Information Technology, Graduate School, Khon Kaen University,
Call Number
THE365
Location
Central Library

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles