Refine your search

Your search returned 272 results.

Not what you expected? Check for suggestions
Public key infrastructure: building trusted applications and Web services building trusted applications and Web services John R. Vacca.

by Vacca, John R.

Publisher: Boca Raton, Fla. : Auerbach Publications, c2004Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 VAC (1).
Network security first-step Tom Thomas

by Thomas, Thomas M.

Publisher: Indianapolis, IN : Cisco Press, c2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 THO (2).
Network security : private communication in a public world Charlie Kaufman, Radia Perlman, Mike Speciner.

by Kaufman, Charlie | Perlman, Radia | Speciner, Michael.

Edition: 2nd ed. Publisher: Delhi : Pearson Education, c2002Availability: Items available for loan: Central Library (CL)Call number: 005.820 KAU (3).
Information security illuminated Michael G. Solomon, Mike Chapple

by Solomon, Michael G | Chapple, Mike.

Publisher: Boston : Jones and Bartlett, 2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 SOL (1).
Secrets and lies : digital security in a networked world Bruce Schneier.

by Schneier, Bruce.

Publisher: New York : John Wiley, 2000Online access: Publisher description | Table of Contents | Contributor biographical information Availability: Items available for loan: Central Library (CL)Call number: 005.8 SCH (1).
Web security: a step-by-step reference guide a step-by-step reference guide Lincoln D. Stein.

by Stein, Lincoln D.

Publisher: Reading, Mass. : Addison-Wesley, c1998Availability: Items available for loan: Central Library (CL)Call number: 005.8 STE (1).
Protect Your Information With Intrusion Detection Alex, Lukatsky.

by Lukatsky, Alex.

Publisher: New Delhi : BPB Publications, 2003Availability: Items available for loan: Central Library (CL)Call number: 005.8 LUK (1).
Mecklermedia's official Internet world Internet security handbook William Stallings.

by Stallings, William.

Publisher: Foster City, CA : IDG Books, c1995Other title: Internet security handbook.Availability: Items available for loan: Central Library (CL)Call number: 005.8 STA (1).
Security for telecommunications network management Moshe Rozenblit.

by Rozenblit, Moshe.

Publisher: New York : Institute of Electrical and Electronics Engineers, 1999Availability: Items available for loan: Central Library (CL)Call number: 621.382 ROZ (1).
Wireless networks: multiuser detection in cross-layer design multiuser detection in cross-layer design Cristina Comaniciu, Narayan B. Mandayam, H. Vincent Poor.

by Comaniciu, Cristina | Mandayam, Narayan B | Poor, H. Vincent.

Publisher: New York : Springer, 2005Online access: Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 621.3821 COM (1).
Non-repudiation in electronic commerce Jianying Zhou.

by Zhou, Jianying.

Publisher: Boston : Artech House, c2001Availability: Items available for loan: Central Library (CL)Call number: 658.054678 ZHO (1).
Non-repudiation in electronic commerce Jianying Zhou.

by Zhou, Jianying.

Publisher: Boston : Artech House, c2001Availability: Items available for loan: Central Library (CL)Call number: 658.054678 ZHO (2).
Security and privacy for e-business Anup K. Ghosh.

by Ghosh, Anup K.

Publisher: New York : Wiley, 2001Availability: Items available for loan: Central Library (CL)Call number: 658.84 GHO (1).
Internet security for business Terry Bernstein

by Bernstein, Terry.

Publisher: New York : Wiley, c1996Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: Central Library (CL)Call number: 658.478 BER (1).
Data communications and network security Houston H. Carr, Charles A. Snyder.

by Carr, Houston H | Snyder, Charles A.

Publisher: Boston : McGraw-Hill Irwin, c2007Other title: Data communications & network security..Availability: Items available for loan: Central Library (CL)Call number: 004.6 CAR (1).
Cryptography and network security : principles and practice principles and practice William Stallings.

by Stallings, William.

Edition: 4th ed. Publisher: New Delhi : Pearson/Prentice Hall, c2006Online access: Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 STA (1). Checked out (1).
Protected internet, intranet, & virtual private networks Alexander Moldovyan ... [et al.]

by Moldovyan, Alexander [aut] | Books24x7, Inc.

Publisher: New Delhi : BPB Publications, c2003Other title: Protected internet, intranet, and virtual private networks.Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 004.68 MOL (1).
Hacking : the art of exploitation Jon Erickson.

by Erickson, Jon.

Edition: 2nd ed. Publisher: San Francisco, CA : No Starch Press, c2008Online access: Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.8 (2). Checked out (2).
Network security essentials: applications and standards applications and standards William Stallings

by Stallings, William.

Edition: 3. ed. Publisher: Upper Saddle River, N. J. : Prentice Hall, cop. 2007Availability: Items available for loan: Central Library (CL)Call number: 005.8 STA (7).
Introduction to cryptography and network security Behrouz A. Forouzan.

by Forouzan, Behrouz A.

Publisher: Boston : McGraw-Hill Higher Education, c2008Online access: Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 FOR (3).
Fundamentals of network security Eric Maiwald.

by Maiwald, Eric.

Publisher: New York : McGraw-Hill Technology Education, c2004Online access: Publisher description | Contributor biographical information | Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.8 MAI (3).
Security+ guide to network security fundamentals Cisco Learning Institute, Paul Campbell, Ben Calvert, Steven Boswell

by Campbell, Paul | Campbell, Paul | Boswell, Steven | Campbell, Paul | Cisco Learning Institute.

Publisher: Cambridge, Mass. : Course Technology, cop. 2003Availability: Items available for loan: Central Library (CL)Call number: 005.8 CAM (1).
Cryptography and Network Security Atul Kahate

by Kahate, Atul.

Publisher: New Delhi: Tat McGraw-Hill, 2003Availability: Items available for loan: Central Library (CL)Call number: 005.8 KAH (1).
Internet denial of service: attack and defense mechanisms Jelena Mirkovic, Sven Dietrich, Dave Dittrich & Peter Reiher

by Mirkovic, Jelena | Sven Dietrich, Dave Dittrich & Peter Reiher.

Publisher: New.Jersey : Prentice Hall Professional Technical Reference, 2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 MIR (1).
High-tech crimes revealed : cyberwar stories from the digital front Steven Branigan.

by Branigan, Steven.

Publisher: Boston, MA : Addison-Wesley, c2005Other title: Cyberwar stories from the digital front..Availability: Items available for loan: Central Library (CL)Call number: 005.8 BRA (3).
Security warrior Cyrus Peikari and Anton Chuvakin

by Peikari, Cyrus | Chuvakin, Anton.

Edition: 1. ed. Publisher: Beijing ; Cambridge : O'Reilly, 2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 PEI (1).
CCNA security study guide Tim Boyles

by Boyles, Tim | Tim Boyles.

Publisher: Canada John Wiley 2010Availability: Items available for loan: Central Library (CL)Call number: 005.8076 BOY (1).
Network security essentials : applications and standards William Stallings

by Stallings, William | William Stallings.

Edition: 4th ed. Publisher: New Delhi Perason Education 2011Availability: Items available for loan: Central Library (CL)Call number: 005.8 STA (4). Checked out (1).
Cryptography and network security : principles and practice William Stallings

by Stallings, William | William Stallings.

Edition: 5th ed. Publisher: New Delhi Pearson education 2011Availability: Items available for loan: Central Library (CL)Call number: 005.8 STA (6). Checked out (1).
Securing the cloud :cloud computer security techniques and tactics Vic J.R. Winkler.

by Winkler, J. R.

Material type: Text Text Publisher: Waltham, MA : Syngress/Elsevier, 2011Availability: Items available for loan: Central Library (CL)Call number: 005.8 WIN (2).
Schneier on security Bruce Schneier.

by Schneier, Bruce.

Material type: Text Text Publisher: Indianapolis, Ind. : Wiley Pub., 2008Availability: Items available for loan: Central Library (CL)Call number: 005.80973 SCH (3).
Computer security : principles and practice William Stallings, Lawrie Brown

by Stallings, William | Brown, Lawrie.

Edition: 2nd ed.Material type: Text Text Publisher: Boston : Pearson, c2012Availability: Items available for loan: Central Library (CL)Call number: 005.8 STA (3).
Network safety EC-Council Press

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston, MA : Course Technology Cengage Learning, 2010Availability: Items available for loan: Central Library (CL)Call number: 005.8 ECC (1).
Cyber safety. EC-Council Press

by International Council of E-Commerce Consultants.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Clifton Park, NY : EC-Council Press ; Course Technology, Cengage Learning, 2010Availability: Items available for loan: Central Library (CL)Call number: 005.8 ECC (1).
Cognitive radio networking and security: a game-theoretic view a game-theoretic view K. J. Ray Liu, Beibei Wang.

by Liu, K. J. Ray, 1961- | Wang, Beibei.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Cambridge ; New York : Cambridge University Press, 2011Online access: Cover image Availability: Items available for loan: Central Library (CL)Call number: 621.384 LIU (1).
CCNA security 640-554 official cert guide Keith Barker

by Barker, Keith | Morris, Scott, 1970- | Cisco Networking Academy Program.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York Pearson education 2013Availability: Items available for loan: Central Library (CL)Call number: 005.8 BAR (1).
Software security engineering : a guide for project managers

by Allen, Julia H | Julia H. Allen.

Material type: Text Text Publisher: New York Addison Wesley 2008Availability: Items available for loan: Central Library (CL)Call number: 005.8 ALL (1).
Hacking exposed : web applications : web application security secrets and solutions web applications : web application security secrets and solutions Joel Scambray, Vincent Liu, Caleb Sima.

by Scambray, Joel | Liu, Vincent | Sima, Caleb.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill, c2011Availability: Items available for loan: Central Library (CL)Call number: 005.8 SCA (1).
CompTIA security+ exam guide (exam SYO-301): all in one all in one Wm. Arthur Conklin

by Conklin, Wm. Arthur (William Arthur).

Edition: 3rd ed.Source: Safari Technical Books (Current File)Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publisher: New York : McGraw-Hill, c2011Online access: Full text available from Safari Technical Books (Current File) Availability: No items available : Checked out (1).
Digital privacy :theory, technologies, and practices theory, technologies, and practices Alessandro Acquisti

by Acquisti, Alessandro.

Source: ITECHnetBASEMaterial type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publisher: New York : Auerbach Publications, c2008Online access: Full text available from ITECHnetBASE Availability: Items available for loan: Central Library (CL)Call number: 005.8 ACQ (1).
Wireless mesh networks : architectures and protocols architectures and protocols Ekram Hossain, Kin Leung

by Hossain, Ekram, 1971- | Leung, Kin K. (Kin Kwong), 1958-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Springer, 2008Online access: Inhaltstext | Cover | Inhaltsverzeichnis | Kapitel 2 | Vorwort 1 Availability: Items available for loan: Central Library (CL)Call number: 621.38215 HOS (1).
The basics of information security : understanding the fundamentals of InfoSec in theory and practice understanding the fundamentals of InfoSec in theory and practice Jason Andress.

by Andress, Jason.

Source: Safari Technical Books (Current File)Source: ScienceDirect Computer Science eBook Collection 2011Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publisher: Amsterdam ; Boston : Syngress, c2011Online access: Full text available from Safari Technical Books (Current File) | Full text available from ScienceDirect Computer Science eBook Collection 2011 Availability: Items available for loan: Central Library (CL)Call number: 005.8 AND (1).
Cloud security and privacy Tim Mather An enterprise perspective on risk and compliance

by Mather, Tim | Kumaraswamy, Subra | Latif, Shahed.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Beijing ; Cambridge [Mass.] : O'Reilly, c2009Availability: Items available for loan: Central Library (CL)Call number: 005.8 MAT (1).
Network security and management

by Singh, Brijendra.

Edition: 3rd ed.Material type: Text Text Publisher: New Delhi, India PHI Learning 2012Availability: Items available for loan: Central Library (CL)Call number: 005.8 SIN (1).
Cryptography and network security

by Forouzan, Behrouz A.

Edition: 2nd ed.Material type: Text Text Publisher: New Delhi, India McGraw Hill 2010Availability: No items available : Checked out (1).
Computer security : principles and practice

by Stallings, William | Brown, Lawrie.

Material type: Text Text Publisher: New Delhi, India Pearson Education 2010Availability: Items available for loan: Central Library (CL)Call number: 005.8 STA (2). Checked out (1).
Network intrusion detection and prevention concepts and techniques / Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee.

by Ghorbani, A. Ali, 1954- | Lu, Wei, 1980- | Tavallaee, Mahbod.

Source: SpringerLink ebooks - Computer Science (2010)Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publisher: New York : Springer, c2010Online access: Full text available from SpringerLink ebooks - Computer Science (2010) Availability: Items available for loan: School of Mechanical & Manufacturing Engineering (SMME)Call number: 005.8 GHO (1).
Mobile hybrid intrusion detection the MOVICAB-IDS system / Álvaro Herrero and Emilio Corchado.

by Herrero, Alvaro | Corchado, Emilio | ebrary, Inc.

Source: SpringerLink ebooks - Engineering (2011)Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publisher: Berlin : Springer, 2011Online access: Full text available from SpringerLink ebooks - Engineering (2011) Availability: Items available for loan: School of Mechanical & Manufacturing Engineering (SMME)Call number: 006.3 HER (1).
Strategic information security / John Wylder.

by Wylder, John.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton, Fl. : Auerbach Publications, 2004Online access: Publisher description Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 WYL (1).
Introduction to cryptography : principles and applications / Hans Delfs, Helmut Knebl.

by Delfs, Hans | Knebl, Helmut.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Berlin ; New York : Springer, 2002Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 (1).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.