Refine your search

Your search returned 425 results.

Not what you expected? Check for suggestions
Security warrior Cyrus Peikari and Anton Chuvakin

by Peikari, Cyrus | Chuvakin, Anton.

Edition: 1. ed. Publisher: Beijing ; Cambridge : O'Reilly, 2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 PEI (1).
Malware detection edited by Mihai Christodorescu ... [et al.]

by Christodorescu, Mihai.

Publisher: New York ; London : Springer, c2007Availability: Items available for loan: Central Library (CL)Call number: 005.8 CHR (1).
Cyber security standards, practices and industrial applications: Systems and methodogies Junaid Ahmad Zubairi

by Junaid Ahmad Zubairi | Athar Mahboob | Junaid Ahmad Zubairi.

Publisher: USA IGI Global 2012Availability: Items available for loan: Central Library (CL)Call number: 005.8 ZUB (1).
Securing the cloud :cloud computer security techniques and tactics Vic J.R. Winkler.

by Winkler, J. R.

Material type: Text Text Publisher: Waltham, MA : Syngress/Elsevier, 2011Availability: Items available for loan: Central Library (CL)Call number: 005.8 WIN (2).
Fighting computer crime : a new framework for protecting information Donn B. Parker.

by Parker, Donn B.

Material type: Text Text Publisher: New York : Wiley, c1998Availability: Items available for loan: Central Library (CL)Call number: 658.478 PAR (5).
Schneier on security Bruce Schneier.

by Schneier, Bruce.

Material type: Text Text Publisher: Indianapolis, Ind. : Wiley Pub., 2008Availability: Items available for loan: Central Library (CL)Call number: 005.80973 SCH (3).
The art of intrusion : the real stories behind the exploits of hackers intruders & deceivers Kevin D. Mitnick, William L. Simon.

by Mitnick, Kevin D | Simon, William L.

Material type: Text Text Publisher: Indianapolis, IN : Wiley, c2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 MIT (3).
Computer security : principles and practice William Stallings, Lawrie Brown

by Stallings, William | Brown, Lawrie.

Edition: 2nd ed.Material type: Text Text Publisher: Boston : Pearson, c2012Availability: Items available for loan: Central Library (CL)Call number: 005.8 STA (3).
The official CHFI exam 312-49 study guide : for computer hacking forensics investigators. for computer hacking forensics investigators.

by Kleiman, Dave.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Burlington, MA : Syngress Pub. , c2007Other title: Exam 312-49 study guide.Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 (1).
Computer security Dieter Gollmann

by Gollmann, Dieter.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Chichester, West Sussex : Wiley, 2011Availability: Items available for loan: Central Library (CL)Call number: 005.8 GOL (1).
Hacking exposed : web applications : web application security secrets and solutions web applications : web application security secrets and solutions Joel Scambray, Vincent Liu, Caleb Sima.

by Scambray, Joel | Liu, Vincent | Sima, Caleb.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill, c2011Availability: Items available for loan: Central Library (CL)Call number: 005.8 SCA (1).
CompTIA security+ exam guide (exam SYO-301): all in one all in one Wm. Arthur Conklin

by Conklin, Wm. Arthur (William Arthur).

Edition: 3rd ed.Source: Safari Technical Books (Current File)Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publisher: New York : McGraw-Hill, c2011Online access: Full text available from Safari Technical Books (Current File) Availability: Items available for loan: Central Library (CL)Call number: 005.8 CON (1).
Digital privacy :theory, technologies, and practices theory, technologies, and practices Alessandro Acquisti

by Acquisti, Alessandro.

Source: ITECHnetBASEMaterial type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publisher: New York : Auerbach Publications, c2008Online access: Full text available from ITECHnetBASE Availability: Items available for loan: Central Library (CL)Call number: 005.8 ACQ (1).
Smart cards, tokens, security and applications Keith E. Mayes and Konstantinos Markantonakis.

by Mayes, Keith E | Markantonakis, Konstantinos.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Springer, c2008Online access: Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 MAY (1).
The basics of information security : understanding the fundamentals of InfoSec in theory and practice understanding the fundamentals of InfoSec in theory and practice Jason Andress.

by Andress, Jason.

Source: Safari Technical Books (Current File)Source: ScienceDirect Computer Science eBook Collection 2011Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publisher: Amsterdam ; Boston : Syngress, c2011Online access: Full text available from Safari Technical Books (Current File) | Full text available from ScienceDirect Computer Science eBook Collection 2011 Availability: Items available for loan: Central Library (CL)Call number: 005.8 AND (1).
Embedded systems security : practical methods for safe and secure software and systems development / David Kleidermacher, Mike Kleidermacher.

by Kleidermacher, David | Kleidermacher, Mike.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Elsevier, 2012Availability: Items available for loan: Central Library (CL)Call number: 005.8 KLE (1).
Hardware security : design, threats, and safeguards design, threats, and safeguards Debdeep Mukhopadhyay, Rajat Subhra Chakraborty.

by Mukhopadhyay, Debdeep [author.] | Chakraborty, Rajat Subhra [author.].

Source: Safari Technical Books (Current File)Source: ENGnetBASESource: ELECTRICALENGINEERINGnetBASEMaterial type: Text Text; Format: electronic available online remote; Literary form: Not fiction Online access: Full text available from ELECTRICALENGINEERINGnetBASE | Full text available from ENGnetBASE | Full text available from Safari Technical Books (Current File) Availability: Items available for loan: Central Library (CL)Call number: 005.8 MUK (1).
Computer security fundamentals,

by Chuck Easttom.

Edition: 2nd ed.Material type: Text Text Publisher: New Delhi Pearson 2015Availability: Items available for loan: Central Library (CL)Call number: 005.8 EAS (1).
Technocrime, policing, and surveillance / Stephane Leman-Langlois.

by Leman-Langlois, Stéphane, 1965-.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York, NY : Routledge, 2012Availability: Items available for loan: Centre for International Peace & Stability (CIPS)Call number: 363.259 TEC 2013 (1).
Introduction to Computer Security

by Bishop, Matt.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: India Dorling Kindersley c2006Online access: Table of contents only Availability: Items available for loan: NUST Baluchistan Campus (NBC)Call number: 005.88BIS (2).
Guide to elliptic curve cryptography

by Hankerson, Darrel R.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New - York Springer c2004Online access: Table of content only Availability: Items available for loan: NUST Baluchistan Campus (NBC)Call number: 005.8HAN (2).
Network intrusion detection and prevention concepts and techniques / Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee.

by Ghorbani, A. Ali, 1954- | Lu, Wei, 1980- | Tavallaee, Mahbod.

Source: SpringerLink ebooks - Computer Science (2010)Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publisher: New York : Springer, c2010Online access: Full text available from SpringerLink ebooks - Computer Science (2010) Availability: Items available for loan: School of Mechanical & Manufacturing Engineering (SMME)Call number: 005.8 GHO (1).
Elliptic curves and their applications to cryptography : an introduction / by Andreas Enge.

by Enge, Andreas.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Kluwer Academic, 1999Online access: Publisher description | Table of contents only Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 ENG (1).
Mission-critical network planning / Matthew Liotine.

by Liotine, Matthew.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Artech House, c2003Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 LIO (1).
Computer security handbook / Richard H. Baker.

by Baker, Richard H.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Blue Ridge Summit, PA : TAB Professional and Reference Books, c1991Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 BAR (1).
Windows 95 and NT 4.0 registry & customization handbook / written by Jerry Honeycutt with Bernard Farrell ... [et al.].

by Honeycutt, Jerry.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis : Que Corp., c1997Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.4469 HON (1).
Introduction to cryptography : principles and applications / Hans Delfs, Helmut Knebl.

by Delfs, Hans | Knebl, Helmut.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Berlin ; New York : Springer, 2002Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 (1).
Hackers beware / Eric Cole.

by Cole, Eric.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, Ind. : New Riders, c2002Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 COL (1).
Java network security / Robert MacGregor ... [et al.].

by Macgregor, Robert | MacGregor, Robert S.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c1998Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 MAC (1).
State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures / Bart Preneel, Vincent Rijmen (eds.).

by Preneel, Bart | Preneel, Bart, 1963- | Rijmen, Vincent, 1970-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Berlin ; New York : Springer, 1998Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 PRE (1).
The CERT guide to system and network security practices / Julia H. Allen.

by Allen, Julia H | Carnegie-Mellon University. CERT Coordination Center.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Addison-Wesley, c2001Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 ALL (1).
Protecting your Web sites with firewalls / Marcus Gonçalves.

by Goncalves, Marcus.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Prentice Hall, c1997Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 GON (1).
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.

by Schneier, Bruce, 1963-.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Wiley, c1996Online access: Click here to access online | Publisher description | Table of Contents Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 SCH (2).
Hacker's challenge 2 : test your network security & forensic skills / Mike Schiffman ... [et al.].

by Schiffman Mike D.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill/Osborne, 2003Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 SCH (1).
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P, 1948-.

Edition: 4th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Prentice Hall, c2007Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 PFL (1).
Incident response and computer forensics. Chris Prosise, Kevin Mandia.

by Prosise, Chris.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: New York, New York : McGraw-Hill/Osborne, c2003Other title: Incident response & computer forensics.Online access: Publisher description | Contributor biographical information | Table of contents Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 PRO (1).
PKI : implementing and managing E-security Andrew Nash

by Nash Andrew | Nash, Andrew.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Osborne/McGraw-Hill, c2001Online access: Publisher description Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.821 NAS (1).
Guide to elliptic curve cryptography Darrel Hankerson, Scott Vanstone, Alfred J. Menezes.

by Hankerson, Darrel R | Vanstone, Scott A | Menezes, A. J. (Alfred J.), 1965-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Springer, 2003Online access: Publisher description Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 HAN (1).
Contemporary cryptology : the science of information integrity edited by Gustavus J. Simmons.

by Simmons Gustavas J | Simmons, Gustavus J | Institute of Electrical and Electronics Engineers.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Piscataway, NJ : IEEE Press, c1992Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 SIM (1).
Digital signatures / Mohan Atreya

by Atreya Mohan | Atreya, Mohan.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Berkeley, Calif. : McGraw-Hill/Osborne, c2002Online access: Publisher description | Contributor biographical information Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 ATR (1).
Network security : private communication in a public world Charlie Kaufman, Radia Perlman, Mike Speciner.

by Kaufman, Charlie | Perlman, Radia | Speciner, Michael.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Englewood Cliffs, New Jersey : PTR Prentice Hall, c1995Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 KAU (1).
Practical cryptography for data internetworks / William Stallings.

by Stallings, William.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Los Alamitos, Calif. : IEEE Computer Society Press, c1996Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 STA (1).
Hacker's challenge : test your incident response skills using 20 scenarios Mike Schiffman.

by Schiffman, Mike.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Osborne/McGraw-Hill, c2001Online access: Publisher description | Table of contents | Contributor biographical information Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 SCH (1).
Hacking exposed Windows 2000 : network security secrets & solutions Joel Scambray, Stuart McClure.

by Scambray, Joel | McClure, Stuart.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Osborne/McGraw-Hill, c2001Other title: Hacking Windows 2000 exposed.Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 SCA (1).
Cyber security standards, practices and industrial applications : systems and methodologies / Junaid Ahmed Zubairi, Athar Mahboob.

by Zubairi, Junaid Ahmed | Zubairi, Junaid Ahmed, 1961- | Mahboob, Athar, 1971-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Hershey, PA : Information Science Reference, c2012Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 ZUB (1).
Inside network security assessment : guarding your IT infrastructure / Michael Gregg, David Kim.

by Gregg, Michael (Michael C.) | Kim, David.

Edition: Low Price EditionMaterial type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, Ind. / New Delhi : Sams/ Pearson Education, c2006Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 GRE (1).
Network security : a beginner's guide / Eric Maiwald.

by Maiwald, Eric.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill/Osborne, c2003Online access: Click here to access online | Table of contents Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 MAI (1).
Hacking Linux exposed : Linux security secrets & solutions / by Brian Hatch, James Lee, George Kurtz.

by Hatch, Brian | Lee, James, 1962- | Kurtz, George.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Osborne/McGraw-Hill, c2001Online access: Click here to access online | Table of contents | Contributor biographical information Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 HAT (1).
Information hiding techniques for steganography and digital watermarking / Stefan Katzenbeisser, Fabien A.P. Petitcolas, editors.

by Katzenbeisser, Stefan | Katzenbeisser, Stefan | Petitcolas, Fabien A. P.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Artech House, 2000Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 KAT (1).
Implementing elliptic curve cryptography / Michael Rosing.

by Rosing, Michael, 1954-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Greenwich : Manning, c1999Other title: Elliptic curve cryptography.Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 ROS (1).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.