Refine your search

Your search returned 424 results.

Not what you expected? Check for suggestions
Introduction to computer security Matt Bishop

by Bishop, Matt.

Publisher: India : Pearson Education, c2005Online access: Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.8 BIS (1).
.NET framework security Brian A. LaMacchia

by LaMacchia, Brian A.

Publisher: Boston : Addison-Wesley, c2002Availability: Items available for loan: Central Library (CL)Call number: 005.8 LAM (1).
Multimedia encryption and watermarking: electronic resource electronic resource Borko Furht, Edin Muharemagic, Daniel Socek.

by Furht, Borivoje | Muharemagic, Edin | Socek, Daniel | MyiLibrary.

Publisher: New York : Springer, 2005Online access: Click here to access online | Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005.8 FUR (1).
Designing network security Merike Kaeo.

by Kaeo, Merike.

Edition: 2nd ed. Publisher: Indianapolis, IN : Cisco Press, c2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 KAE (2).
Computer security: a global challenge : proceedings of the Second IFIP International Conference on Computer Security, IFIP/Sec'84, Toronto, Ontario, Canada, 10-12 September, 1984 : a global challenge : proceedings of the Second IFIP International Conference on Computer Security, IFIP/Sec'84, Toronto, Ontario, Canada, 10-12 September, 1984 edited by James H. Finch and E. Graham Dougall.

by Finch, James H | Dougall, E. Graham | International Federation for Information Processing . Technical Committee 11: Security and Protection in Information Processing Systems | Canadian Information Processing Society . Toronto Chapter.

Publisher: Amsterdam ; New York ; New York, N.Y. : North-Holland : Sole distributors for the U.S.A. and Canada, Elsevier Science Pub. Co., 1984Availability: Items available for loan: Central Library (CL)Call number: 005.8 FIN (1).
Secure computers and networks : analysis, design, and implementation Eric A. Fisch, Gregory B. White

by Fisch, Eric A | White, Gregory B.

Publisher: Boca Raton, FL : CRC Press, 2000Availability: Items available for loan: Central Library (CL)Call number: 005.8 FIS (1).
Computer security Dieter Gollmann

by Gollmann, Dieter.

Edition: 2nd ed Publisher: New Delhi : Wiley & Sons (Asia) Ltd., c2006Availability: Items available for loan: Central Library (CL)Call number: 005.8 GOL (3).
Privacy protection and computer forensics Michael A. Caloyannides.

by Caloyannides, Michael A | Caloyannides, Michael A.

Edition: 2nd ed. Publisher: Boston : Artech House, c2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 CAL (1).
Fundamentals of network security John E. Canavan.

by Canavan, John E.

Publisher: Boston : Artech House, c2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 CAN (1).
Intrusion prevention fundamentals Earl Carter, Jonathan Hogue

by Carter, Earl | Hogue, Jonathan.

Publisher: Indianapolis, IN : Cisco Press, c2006Other title: Introduction to network attack mitigation with IPS.Availability: Items available for loan: Central Library (CL)Call number: 005.8 CAR (1).
Network security bible Eric Cole, Ronald Krutz, and James W. Conley.

by Cole, Eric | Krutz, Ronald L, 1938- | Conley, James W.

Publisher: Indianapolis, IN : Wiley Pub., c2005Online access: Table of contents only | Contributor biographical information | Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 COL (1).
introduction to information security risk management NIIT

by NIIT.

Publisher: New Delhi : Prentice-Hall of India Pvt.Ltd. 2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 NII (1).
Firewalls and internet security: repelling the wily hacker repelling the wily hacker William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin

by Cheswick, William R | Bellovin, Steven M | Rubin, Aviel D.

Edition: 2. ed. Publisher: India: Pearson Education, cop. 2003Availability: Items available for loan: Central Library (CL)Call number: 005.8 CHE (2).
Security in pervasive computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005 : proceedings Dieter Hutter, Markus Ullmann

by Hutter, Dieter | Ullmann, Markus.

Publisher: Berlin ; New York : Springer, c2005Other title: Security in pervasive computing [electronic resource] | SPC 2005..Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005.8 HUT (1).
Security+ Kirk Hausman, Diane Barrett, Martin Weiss.

by Hausman, Kalani Kirk.

Publisher: Indianapolis, Ind. : Que, Availability: Items available for loan: Central Library (CL)Call number: 005.8 HAU (2).
Firewalls : a complete guide Marcus

Publisher: New York : McGraw-Hill, c2000Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005.8 GON (1).
Elliptic curves in cryptography I.F. Blake, G. Seroussi, and N.P. Smart.

by Blake, Ian F | Seroussi, G, 1955- | Smart, Nigel P, 1967-.

Publisher: New York : Cambridge University Press, 1999Online access: Publisher description | Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.82 BLA (1).
Secure group communications over data networks Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras.

by Zou, Xukai | Ramamurthy, Byrav | Magliveras, Spyros S, 1938-.

Publisher: New York : Springer c2005Online access: Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 ZOU (1).
Voice and data security Gregory White ... [et al.].

by White, Gregory B.

Publisher: Indianapolis, Ind. : SAMS, 2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 WHI (1).
Principles of information security Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E | Mattord, Herbert J.

Edition: 2nd ed. Publisher: Boston, Mass. : Thomson Course Technology, c2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 WHI (1).
Enhancing computer security with smart technology V. Rao Vemuri.

by Vemuri, V. Rao.

Publisher: Boca Raton, FL : Auerbach Publications, 2006Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 VEM (1).
Firewalls : jumpstart for network and systems administrators jumpstart for network and systems administrators John R. Vacca, Scott Ellis.

by Vacca, John R | Ellis, Scott, 1968-.

Publisher: Amsterdam ; Boston : Elsevier Digital, c2005Online access: Table of contents | Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 VAC (1).
Computer forensics : computer crime scene investigation John R. Vacca.

by Vacca, John R.

Edition: 2nd ed. Publisher: Hingham, Mass. : Charles River Media, 2005Online access: Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.8 VAC (1).
Public key infrastructure: building trusted applications and Web services building trusted applications and Web services John R. Vacca.

by Vacca, John R.

Publisher: Boca Raton, Fla. : Auerbach Publications, c2004Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 VAC (1).
.NET security and cryptography Peter Thorsteinson

by Thorsteinson, Peter | G. Gnana Arun Ganesh.

Publisher: New Delhi . Pearson Education Inc., : c2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 THO (3).
Viruses revealed David Harley, Robert Slade, Urs Gattiker.

by Harley, David | Slade, Robert | Gattiker, Urs E.

Publisher: Berkeley, Calif. : Osborne/McGraw-Hill, c2001Online access: Publisher description | Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.84 HAR (1).
Network security : private communication in a public world Charlie Kaufman, Radia Perlman, Mike Speciner.

by Kaufman, Charlie | Perlman, Radia | Speciner, Michael.

Edition: 2nd ed. Publisher: Delhi : Pearson Education, c2002Availability: Items available for loan: Central Library (CL)Call number: 005.820 KAU (3).
Information security illuminated Michael G. Solomon, Mike Chapple

by Solomon, Michael G | Chapple, Mike.

Publisher: Boston : Jones and Bartlett, 2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 SOL (1).
Secrets and lies : digital security in a networked world Bruce Schneier.

by Schneier, Bruce.

Publisher: New York : John Wiley, 2000Online access: Publisher description | Table of Contents | Contributor biographical information Availability: Items available for loan: Central Library (CL)Call number: 005.8 SCH (1).
Digital watermarking for digital media Juergen Seitz, editor

by Seitz, Juergen, 1968-.

Publisher: Hershey, PA : Information Science Pub., c2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 SEI (1).
Practical cryptography Niels Ferguson, Bruce Schneier.

by Schneier, Bruce | Schneier, Bruce, 1963-.

Publisher: New York : Wiley, c2003Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.8 SCH (7).
Protect Your Information With Intrusion Detection Alex, Lukatsky.

by Lukatsky, Alex.

Publisher: New Delhi : BPB Publications, 2003Availability: No items available : Checked out (1).
Mecklermedia's official Internet world Internet security handbook William Stallings.

by Stallings, William.

Publisher: Foster City, CA : IDG Books, c1995Other title: Internet security handbook.Availability: Items available for loan: Central Library (CL)Call number: 005.8 STA (1).
Security and privacy for e-business Anup K. Ghosh.

by Ghosh, Anup K.

Publisher: New York : Wiley, 2001Availability: Items available for loan: Central Library (CL)Call number: 658.84 GHO (1).
Database and applications security: integrating information security and data management integrating information security and data management Bhavani Thuraisingham

by Thuraisingham, Bhavani M.

Publisher: Boca Raton, FL : Auerbach Publications, 2005Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 THU (1).
E-business privacy and trust : planning and management strategies Paul Shaw.

by Shaw, Paul.

Publisher: New York ; Chichester : Wiley, c2001Availability: Items available for loan: Central Library (CL)Call number: 658.8 SHA (1).
Introduction to cryptography with Java applets David Bishop.

by Bishop, David.

Publisher: New Delhi: Narosa Publishing House, 2003Availability: Items available for loan: Central Library (CL)Call number: 005.8 BIS (2).
Cryptography, information theory, and error-correction: a handbook for the 21st century a handbook for the 21st century Aiden A. Bruen, Mario A. Forcinito.

by Bruen, Aiden A | Forcinito, Mario, 1962-.

Publisher: Hoboken, N.J. : Wiley-Interscience, c2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 BRU (1).
CISSP : Certified Information Systems Security Professional study guide Ed Tittel, Mike Chapple, James Michael Stewart.

by Tittel, Ed | Chapple, Mike | Stewart, James Michael.

Publisher: New Delhi : BPB Publications, 2003Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 TIT (1).
Cryptography and network security : principles and practice principles and practice William Stallings.

by Stallings, William.

Edition: 4th ed. Publisher: New Delhi : Pearson/Prentice Hall, c2006Online access: Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 STA (1). Checked out (1).
Introduction to modern cryptography Jonathan Katz, Yehuda Lindell.

by Katz, Jonathan | Lindell, Yehuda.

Publisher: Boca Raton : Chapman & Hall/CRC, c2008Online access: Table of contents only | Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 KAT (1).
Hacking : the art of exploitation Jon Erickson.

by Erickson, Jon.

Edition: 2nd ed. Publisher: San Francisco, CA : No Starch Press, c2008Online access: Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.8 ERI (3). Checked out (1).
Introduction to cryptography : principles and applications Hans Delfs, Helmut Knebl.

by Delfs, Hans | Knebl, Helmut.

Publisher: Berlin ; New York : Springer, c2002Availability: Items available for loan: Central Library (CL)Call number: 005.82 DEL (1).
Computer security and cryptography Alan G. Konheim.

by Konheim, Alan G.

Publisher: Hoboken, N.J. : Wiley-Interscience, c2007Availability: Items available for loan: Central Library (CL)Call number: 005.8 KON (3).
Security+ guide to network security fundamentals Cisco Learning Institute, Paul Campbell, Ben Calvert, Steven Boswell

by Campbell, Paul | Campbell, Paul | Boswell, Steven | Campbell, Paul | Cisco Learning Institute.

Publisher: Cambridge, Mass. : Course Technology, cop. 2003Availability: Items available for loan: Central Library (CL)Call number: 005.8 CAM (1).
Digital watermarking and steganography: fundamentals and techniques fundamentals and techniques Frank Y. Shih.

by Shih, Frank Y.

Publisher: Boca Raton : CRC Press, c2008Availability: Items available for loan: Central Library (CL)Call number: 005.8 SHI (1).
Cryptography and Network Security Atul Kahate

by Kahate, Atul.

Publisher: New Delhi: Tat McGraw-Hill, 2003Availability: Items available for loan: Central Library (CL)Call number: 005.8 KAH (1).
Information security: principles and practice principles and practice Mark Stamp.

by Stamp, Mark.

Publisher: Hoboken, NJ : Wiley, c2006Other title: Information security.Availability: Items available for loan: Central Library (CL)Call number: 005.8 STA (1).
Machine learning and data mining for computer security: methods and applications methods and applications Marcus A. Maloof

by Maloof, Marcus A | Maloof, Marcus A.

Publisher: London : Springer, 2006Availability: Items available for loan: Central Library (CL)Call number: 006.31 MAL (1).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.