Refine your search

Your search returned 988 results.

Not what you expected? Check for suggestions
Java 2 network security Marco Pistoia ... [et al.].

by Pistoia, Marco.

Edition: 2nd ed. Publisher: Upper Saddle River, N.J. : Prentice Hall, c1999Availability: Items available for loan: Central Library (CL)Call number: 005.8.PIS (2).
Information security risk analysis Thomas R. Peltier.

by Peltier, Thomas R.

Edition: 2nd ed. Publisher: Boca Raton : Auerbach Publications, 2005Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 PEL (1).
Internet and Intranet security Rolf Oppliger.

by Oppliger, Rolf.

Edition: 2nd ed. Publisher: Boston, MA : Artech House, 2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 OPP (1).
Firewall architecture for the enterprise Norbert Pohlmann and Tim Crothers.

by Pohlmann, Norbert | Crothers, Tim.

Publisher: New York, NY : Wiley Pub., c2002Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.8 POH (1).
Enterprise security Robert C. Newman

by Newman, Robert C.

Publisher: New Delhi : Pearson Education Inc., c2003Availability: Items available for loan: Central Library (CL)Call number: 005.8 NEW (2).
Defense and detection strategies against Internet worms Jose Nazario.

by Nazario, Jose.

Publisher: Boston, MA : Artech House, 2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 NAZ (1).
Mastering network security Chris Brenton, Cameron Hunt.

by Brenton, Chris | Hunt, Cameron.

Edition: 2nd ed. Publisher: San Francisco : Sybex, c2003Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 BRE (5).
Network security assessment Chris McNab

by McNab, Chris.

Edition: 1st edition. Publisher: Sebastopol, CA ; O'Reilly Media, c2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 MCN (1).
Internet security protocols : protecting IP traffic Uyless Black.

by Black, Uyless D.

Publisher: India : Pearson Education Asia, c2000Availability: Items available for loan: Central Library (CL)Call number: 005.8 BLA (2).
Designing network security Merike Kaeo.

by Kaeo, Merike.

Edition: 2nd ed. Publisher: Indianapolis, IN : Cisco Press, c2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 KAE (2).
Network security technologies Kwok T. Fung.

by Fung, K. T.

Edition: 2nd ed. Publisher: Boca Raton, FL : Auerbach Publications, c2005Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 FUN (2).
Secure computers and networks : analysis, design, and implementation Eric A. Fisch, Gregory B. White

by Fisch, Eric A | White, Gregory B.

Publisher: Boca Raton, FL : CRC Press, 2000Availability: Items available for loan: Central Library (CL)Call number: 005.8 FIS (1).
The complete Cisco VPN configuration guide Richard Deal

by Deal, Richard A | Cisco Systems, Inc.

Publisher: Indianapolis, Ind. : Cisco Press, c2006Online access: Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 DEA (1).
Securing Windows Server 2003 Mike Danseglio

by Danseglio, Mike.

Publisher: Sebastopol, Calif. : O'Reilly, c2005Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 DAN (1).
Data communications and network security Houston H. Carr, Charles A. Snyder

by Carr, Houston H | Snyder, Charles A.

Publisher: India : Tata McGraw-Hill Irwin, c2007Other title: Data communications & network security.Online access: Publisher description | Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.8 CAR (1).
Fundamentals of network security John E. Canavan.

by Canavan, John E.

Publisher: Boston : Artech House, c2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 CAN (1).
Intrusion prevention fundamentals Earl Carter, Jonathan Hogue

by Carter, Earl | Hogue, Jonathan.

Publisher: Indianapolis, IN : Cisco Press, c2006Other title: Introduction to network attack mitigation with IPS.Availability: Items available for loan: Central Library (CL)Call number: 005.8 CAR (1).
Network security bible Eric Cole, Ronald Krutz, and James W. Conley.

by Cole, Eric | Krutz, Ronald L, 1938- | Conley, James W.

Publisher: Indianapolis, IN : Wiley Pub., c2005Online access: Table of contents only | Contributor biographical information | Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 COL (1).
Error correcting coding and security for data networks: analysis of the superchannel concept analysis of the superchannel concept G. Kabatiansky, E. Krouk, S. Semenov.

by Kabatiansky, G | Krouk, E | Semenov, S | Wiley InterScience (Online service).

Publisher: London : John Wiley & Sons, c2005Other title: Error correcting coding and security for data networks [electronic resource].Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005.8 KAB (1).
Network security: a practical approach a practical approach Jan L. Harrington.

by Harrington, Jan L.

Publisher: Amsterdam ; Boston : Elsevier : Morgan Kaufmann Publishers, c2005Online access: Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 (1).
Security in wireless LANs and MANs Thomas Hardjono, Lakshminath R. Dondeti.

by Hardjono, Thomas | Dondeti, Lakshminath R.

Publisher: Boston : Artech House, 2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 HAR (1).
ASP MTS ADSI Web security Harrison.

by Harrison, Richard.

Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c1999Availability: Items available for loan: Central Library (CL)Call number: 005.8 HAR (1).
Secure group communications over data networks Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras.

by Zou, Xukai | Ramamurthy, Byrav | Magliveras, Spyros S, 1938-.

Publisher: New York : Springer c2005Online access: Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 ZOU (1).
Voice and data security Gregory White ... [et al.].

by White, Gregory B.

Publisher: Indianapolis, Ind. : SAMS, 2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 WHI (1).
Principles of information security Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E | Mattord, Herbert J.

Edition: 2nd ed. Publisher: Boston, Mass. : Thomson Course Technology, c2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 WHI (1).
Network security with OpenSSL John Viega, Matt Messier and Pravir Chandra.

by Viega, John | Messier, Matt | Chandra, Pravir.

Edition: 1st ed. Publisher: Sebastopol, CA : O'Reilly, c2002Other title: Network security with Open secure socket layer.Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 VIE (1).
Enhancing computer security with smart technology V. Rao Vemuri.

by Vemuri, V. Rao.

Publisher: Boca Raton, FL : Auerbach Publications, 2006Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 VEM (1).
Computer forensics : computer crime scene investigation John R. Vacca.

by Vacca, John R.

Edition: 2nd ed. Publisher: Hingham, Mass. : Charles River Media, 2005Online access: Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.8 VAC (1).
Public key infrastructure: building trusted applications and Web services building trusted applications and Web services John R. Vacca.

by Vacca, John R.

Publisher: Boca Raton, Fla. : Auerbach Publications, c2004Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 VAC (1).
Network security first-step Tom Thomas

by Thomas, Thomas M.

Publisher: Indianapolis, IN : Cisco Press, c2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 THO (2).
Network security : private communication in a public world Charlie Kaufman, Radia Perlman, Mike Speciner.

by Kaufman, Charlie | Perlman, Radia | Speciner, Michael.

Edition: 2nd ed. Publisher: Delhi : Pearson Education, c2002Availability: Items available for loan: Central Library (CL)Call number: 005.820 KAU (3).
Mastering data mining: the art and science of customer relationship management the art and science of customer relationship management Michael J. A. Berry, Gordon Linoff.

by Berry, Michael J. A | Linoff, Gordon | Berry, Michael J. A.

Publisher: New York : Wiley Computer Pub., c2000Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: Central Library (CL)Call number: 006.3 BER (1).
Information security illuminated Michael G. Solomon, Mike Chapple

by Solomon, Michael G | Chapple, Mike.

Publisher: Boston : Jones and Bartlett, 2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 SOL (1).
Data mining your website Mena, Jesus

Publisher: cBoston : Digital Press, c1999Availability: Items available for loan: Central Library (CL)Call number: 006.3 MEN (1).
Secrets and lies : digital security in a networked world Bruce Schneier.

by Schneier, Bruce.

Publisher: New York : John Wiley, 2000Online access: Publisher description | Table of Contents | Contributor biographical information Availability: Items available for loan: Central Library (CL)Call number: 005.8 SCH (1).
Multimedia over IP and wireless networks: compression, networking, and systems compression, networking, and systems Philip A. Chou, Mihaela van der Schaar

by Chou, Philip A | Chou, Philip A | Schaar, Mihaela van der.

Publisher: Amsterdam ; Boston : Elsevier/Academic Press, c2007Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 006.7 CHO (4).
Web security: a step-by-step reference guide a step-by-step reference guide Lincoln D. Stein.

by Stein, Lincoln D.

Publisher: Reading, Mass. : Addison-Wesley, c1998Availability: Items available for loan: Central Library (CL)Call number: 005.8 STE (1).
Interconnections: bridges, routers, switches, and internetworking protocols bridges, routers, switches, and internetworking protocols Radia Perlman.

by Perlman, Radia.

Edition: 2nd ed. Publisher: Reading, Mass. : Addison Wesley, c2000Availability: Items available for loan: Central Library (CL)Call number: 006.693 PER (1).
Protect Your Information With Intrusion Detection Alex, Lukatsky.

by Lukatsky, Alex.

Publisher: New Delhi : BPB Publications, 2003Availability: No items available : Checked out (1).
Mecklermedia's official Internet world Internet security handbook William Stallings.

by Stallings, William.

Publisher: Foster City, CA : IDG Books, c1995Other title: Internet security handbook.Availability: Items available for loan: Central Library (CL)Call number: 005.8 STA (1).
Cyberlaw : text and cases Gerald R. Ferrera

by Ferrera, Gerald R.

Publisher: Cincinnati, Ohio : West/Thomson Learning, c2001Availability: No items available : Checked out (1).
ATM : the future of high-speed networking Walter Goralski.

by Goralski, Walter.

Edition: 2nd ed. Publisher: Charleston, S.C. : Computer Technology Research Corp., 1995Availability: Items available for loan: Central Library (CL)Call number: 384.5 GOR (1).
Data communications and networking Behrouz A. Forouzan ; with Catherine Coombs and Sophia Chung Fegan

by Forouzan, Behrouz A | Coombs, Catherine [aut] | Fegan, Sophia Chung [aut].

Edition: 2nd ed. Availability: Items available for loan: Central Library (CL)Call number: 004.6 FOR (1).
DWDM network designs and engineering solutions Ashwin Gumaste and Tony Anthony.

by Gumaste, Ashwin | Anthony, Tony.

Publisher: Indianapolis, Ind. : Cisco Press, c2003Availability: No items available : Checked out (1).
Wireless and mobile data networks Aftab Ahmad.

by Ahmad, Aftab.

Publisher: Hoboken, N.J. : Wiley-Interscience, c2005Online access: Table of contents only | Contributor biographical information | Publisher description Availability: Items available for loan: Central Library (CL)Call number: 621.382 AFT (1).
Proceedings of the European Conference on Networks and Optical Communications 2000 editors, D.W. Faulkner and A.L. Harmer.

by Faulkner, D. W | Harmer, Alan.

Publisher: Amsterdam ; Washington, DC : IOS Press, c2000Other title: WDM and photonic networks | Broadband access, WDM metro and network management.Availability: Items available for loan: Central Library (CL)Call number: 621.382 FAU (1).
Reorganizing data and voice networks : communications resourcing for corporate networks communications resourcing for corporate networks Thomas R. Koehler.

by Koehler, Thomas R.

Publisher: Boston : Artech House, 2004Availability: Items available for loan: Central Library (CL)Call number: 621.382 KOE (2).
Nanotechnology applications to telecommunications and networking Daniel Minoli.

by Minoli, Daniel.

Publisher: Hoboken, N.J. : Wiley-Interscience, c2006Online access: Publisher description | Table of contents only | Contributor biographical information Availability: Items available for loan: Central Library (CL)Call number: 621.382 MIN (2).
Optical network control Greg Bernstein, Bala Rajagopalan, Debanjan Saha.

by Bernstein, Greg | Rajagopalan, Bala | Saha, Debanjan.

Publisher: Delhi : PERSON Edecation, c2004Availability: Items available for loan: Central Library (CL)Call number: 621.3827 BER (2).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.