Refine your search

Your search returned 43 results.

Not what you expected? Check for suggestions
Digital fortress / Dan Brown.

by Brown, Dan, 1964-.

Material type: Text Text; Format: print ; Literary form: Fiction Publisher: New York : Thomas Dunne Books, 1998Online access: Contributor biographical information | Publisher description | Sample text Availability: Items available for loan: Central Library (CL)Call number: 823 BRO (3).
Management information systems: managing information technology in the networked enterprise managing information technology in the networked enterprise James A. O'Brien.

by O'Brien, James A.

Edition: 3rd ed. Publisher: Chicago : Irwin, c1996Availability: Items available for loan: Central Library (CL)Call number: 658.4038011 OBR (1).
Windows NT server 4 : professional reference / Karanjit S. Siyan.

by Siyan, Karanjit.

Publisher: Indianapolis, Ind. : New Riders Pub. , c1996Availability: Items available for loan: Central Library (CL)Call number: 005.265 SIY (1).
Secrets and lies : digital security in a networked world Bruce Schneier.

by Schneier, Bruce.

Publisher: New York : Wiley Pub., c2000Availability: Items available for loan: Central Library (CL)Call number: 005.8 SCH (5).
Quantum communications and cryptography Alexander V. Sergienko.

by Sergienko, Alexander V.

Publisher: Boca Raton, FL : Taylor & Francis, 2006Online access: Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005.8 (1).
Digital watermarking and steganography: fundamentals and techniques fundamentals and techniques Frank Y. Shih.

by Shih, Frank Y.

Publisher: Boca Raton : CRC Press, c2008Availability: Items available for loan: Central Library (CL)Call number: 005.8 SHI (1).
Multihop wireless networks : opportunistic routing opportunistic routing Kai Zeng, Wenjing Lou, Ming Li.

by Zeng, Kai | Lou, Wenjing | Li, Ming, 1985-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York Wiley, 2011Online access: Cover image Availability: Items available for loan: Central Library (CL)Call number: 621.38782 (1).
Hardware security : design, threats, and safeguards design, threats, and safeguards Debdeep Mukhopadhyay, Rajat Subhra Chakraborty.

by Mukhopadhyay, Debdeep [author.] | Chakraborty, Rajat Subhra [author.].

Source: Safari Technical Books (Current File)Source: ENGnetBASESource: ELECTRICALENGINEERINGnetBASEMaterial type: Text Text; Format: electronic available online remote; Literary form: Not fiction Online access: Full text available from ELECTRICALENGINEERINGnetBASE | Full text available from ENGnetBASE | Full text available from Safari Technical Books (Current File) Availability: Items available for loan: Central Library (CL)Call number: 005.8 MUK (1).
Technocrime, policing, and surveillance / Stephane Leman-Langlois.

by Leman-Langlois, Stéphane, 1965-.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York, NY : Routledge, 2012Availability: Items available for loan: Centre for International Peace & Stability (CIPS)Call number: 363.259 TEC 2013 (1).
Data and Computer Communications / William Stallings.

by Stallings, William.

Edition: 6th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, N.J. : Prentice Hall, c2000Other title: Data & computer communications.Availability: Items available for loan: School of Mechanical & Manufacturing Engineering (SMME)Call number: 004.65 STA (1).
Computer Networks / Andrew S. Tanenbaum.

by Tanenbaum, Andrew S, 1944-.

Edition: 4th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Prentice Hall, c 2003Availability: Items available for loan: School of Mechanical & Manufacturing Engineering (SMME)Call number: 004.65 TAN (1).
Handbook of ambient intelligence and smart environments \ Hideyuki Nakashima, Hamid Aghajan, Juan Carlos Augusto, editors.

by Nakashima, Hideyuki | Nakashima, Hideyuki | Aghajan, Hamid K | Augusto, Juan Carlos.

Source: SpringerLink ebooks - Computer Science (2010)Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publisher: New York : Springer, c2010Online access: Full text available from SpringerLink ebooks - Computer Science (2010) Availability: Items available for loan: School of Mechanical & Manufacturing Engineering (SMME)Call number: 004.019 HAN (1).
Java network security / Robert MacGregor ... [et al.].

by Macgregor, Robert | MacGregor, Robert S.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c1998Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 MAC (1).
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.

by Schneier, Bruce, 1963-.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Wiley, c1996Online access: Click here to access online | Publisher description | Table of Contents Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 SCH (2).
Hacking Linux exposed : Linux security secrets & solutions / by Brian Hatch, James Lee, George Kurtz.

by Hatch, Brian | Lee, James, 1962- | Kurtz, George.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Osborne/McGraw-Hill, c2001Online access: Click here to access online | Table of contents | Contributor biographical information Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 HAT (1).
MCSE--NT workstation 4 study guide / (Include CD) Charles Perkins, Matthew Strebe, and James Chellis.

by Perkins, Charles | Chellis, James | Perkins, Charles, 1969- | Strebe, Matthew.

Edition: 2nd ed. Publisher: San Francisco : Network Press, c1998Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.44769,PER (1).
Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers / Bruce Christianson ... [et al.] (eds.).

by Christianson, Bruce.

Publisher: Berlin ; New York : Springer, c2005Online access: Publisher description | Table of contents only | Click here to access online Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.82,SEC (1).
CISA--Certified Information Systems Auditor : (Include CD) study guide / David L. Cannon, Timothy S. Bergmann, Brady Pamplin.

by Cannon, David L | Bergmann, Timothy S | Pamplin, Brady.

Publisher: Indianapolis, Indiana : Wiley Pub., c2006Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Military College of Signals (MCS)Call number: 658.478,CAN (1).
The book of wireless-(E-BOOK) a painless guide to wi-fi and broadband wireless / by John Ross.

by Ross, John | Ross, John, 1947-.

Edition: 2nd ed. Publisher: San Francisco : No Starch Press, c2008Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Military College of Signals (MCS)Call number: 004.68 ROS (1).
The E-Privacy imperative : protect your customers' Internet privacy and ensure your company's survival in the electronic age / Mark S. Merkow, James Breithaupt.

by Merkow, Mark S | Breithaupt, Jim, 1955-.

Publisher: New York : AMACOM, c2002Availability: Items available for loan: Military College of Signals (MCS)Call number: 658.478 MER (1).
The E-Privacy imperative (E-Book) protect your customers' Internet privacy and ensure your company's survival in the electronic age / Mark S. Merkow, James Breithaupt.

by Merkow, Mark S | Breithaupt, Jim, 1955-.

Publisher: New York : AMACOM, c2002Availability: Items available for loan: Military College of Signals (MCS)Call number: 658.478 (1).
The E-Privacy imperative (E-Book) protect your customers' Internet privacy and ensure your company's survival in the electronic age / Mark S. Merkow, James Breithaupt.

by Merkow, Mark S | Breithaupt, Jim, 1955-.

Publisher: New York : AMACOM, c2002Availability: Items available for loan: Military College of Signals (MCS)Call number: 658.478 (1).
Cyber infrastructure protection (E-Book) Tarek Saadawi, Louis Jordan, Jr. editors.

by Jordan, Louis [edt] | Saadawi, Tarek Nazir, 1951- [edt] | Army War College (U.S.). Strategic Studies Institute.

Publisher: Carlisle, PA : Strategic Studies Institute, U.S. Army War College, [2011]Online access: Click here to access online Availability: Items available for loan: Military College of Signals (MCS) (1).
Secure Key Establishment (E-BOOK) Sushil Jajodia .

by Sushil Jajodia | Choo.

Publisher: Boston, MA : Springer-Verlag US, 2009Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 JAJ (1).
CISA: certified information systems auditor study guide (EBOOK) David Cannon.

by Cannon, David L.

Edition: 3rd ed. Publisher: Indianapolis, Ind. : Wiley Pub., c2011Online access: Cover image Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 CAN (1).
XMPP: Building Real-Time Applications with Jabber Technologies (E-BOOK)

by Saint-Andre, Peter | Smith, Kevin | Tron�on, Remko.

Publisher: Sebastopol : O'Reilly Media, Inc., 2009Online access: Click here to access online | Click here to access online Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.1 PET (1).
Security strategies in Linux platforms and applications / Michael Jang.

by Jang, Michael H.

Publisher: Sudbury, MA : Jones & Bartlett Learning, c2011Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,JAN (1).
Internet measurement : infrastructure, traffic and applications / Mark Crovella.

by Crovella, Mark | Krishnamurthy, Balachander.

Publisher: [S.l.] : Wiley, 2006Online access: Amazon.com | Amazon customer reviews Availability: Items available for loan: Central Library (CL)Call number: 004.678 CRO (2).
Intranet Security : stories from the trenches Linda McCarthy.

by Linda McCarthy.

Edition: 1st ed. Publisher: [S.l.] : Prentice Hall PTR, 1998Online access: Amazon.com Availability: Items available for loan: Central Library (CL)Call number: 005.8 MCC (2).
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters.

by Ligh, Michael Hale | Case, Andrew (Digital forensics researcher) | Levy, Jamie | Walters, Aaron.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, [2014]Copyright date: ©2014Other title: Detecting malware and threats in Windows, Linux, and Mac memory.Online access: Contributor biographical information | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 004.5028558 LIG (2).
Handbook of digital forensics of multimedia data and devices / edited by Anthony T.S. Ho and Shujun Li, Department of Computing and Surrey Centre for Cyber Security (SCCS), University of Surrey, UK.

by Ho, Anthony T. S, 1958-.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Hoboken : Wiley/IEEE Press, 2015Online access: Cover image Availability: Items available for loan: Central Library (CL)Call number: 363.2562 HAN (2).
It encyclopaedia.com,vol-4 computer networks and e-commerce

by Diwan, Parag Suri, R.K Kaushik, Sanjay.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: NEW DELHI PENTAGON PRESS 2001Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 004.03 ITE (1).
Shipping law / By Simon Baughen.

by Baughen, Simon [author.].

Edition: Seventh edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Milton Park, Abingdon, Oxon ; New York, NY : Routlege, 2019Availability: Items available for loan: NUST Law School (NLS)Call number: 343.41096 BAU (1).
Hacking the hacker : learn from the experts who take down hackers / Roger A. Grimes.

by Grimes, Roger A [author.] | International Information Systems Security Certification Consortium.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, IN : John Wiley & Sons, Inc., [2017]Copyright date: ©2017Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,GRI (1).
Secrets of computer espionage : tactics and countermeasures / Joel McNamara.

by McNamara, Joel.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Wiley, 2003Online access: Contributor biographical information | Table of contents | Publisher description Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,MCN (1).
Rail Transport-Systems Approach / edited by Aleksander Sładkowski.

by Sładkowski, Aleksander [editor.].

Edition: 1st ed. 2017.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing : Imprint: Springer, 2017Availability: Items available for loan: School of Civil and Environmental Engineering (SCEE)Call number: 385.068 ALE (1).
Computer security : principles and practice / William Stallings, Lawrie Brown, UNSW Canberra at the Australian Defence Force Academy.

by Stallings, William [author.] | Brown, Lawrie [author.].

Edition: Fifth edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Hoboken, NJ : Pearson Education, Inc., [2024]Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 280 SCB (1).
Constitutional and administrative law / Hilaire Barnett.

by Barnett, Hilaire [author.].

Edition: Fifteenth edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Abingdon, Oxon ; New York, NY : Routledge, [2024]Availability: Items available for loan: NUST Law School (NLS)Call number: 342.41 BAR (1).
Mechanisms of Arsenic Toxicity and Tolerance in Plants / edited by Mirza Hasanuzzaman, Kamrun Nahar, Masayuki Fujita.

by Fujita, Masayuki [editor.] | Hasanuzzaman, Mirza [editor.] | Nahar, Kamrun [editor.].

Edition: 1st ed. 2018.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Singapore : Springer Singapore : Imprint: Springer, 2018Availability: Items available for loan: Atta-ur-Rahman School of Applied Biosciences (ASAB)Call number: 571.2 MEC 2018 3525 (1).
Soil Science: Agricultural and Environmental Prospectives / edited by Khalid Rehman Hakeem, Javaid Akhtar, Muhammad Sabir.

by Hakeem, Khalid Rehman [editor.] | Akhtar, Javaid [editor.] | Sabir, Muhammad [editor.].

Edition: 1st ed. 2016.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing : Imprint: Springer, 2016Availability: Items available for loan: Atta-ur-Rahman School of Applied Biosciences (ASAB)Call number: 630 SOI 2016 3546 (1).
Development of Enhanced Image Dehazing Techniques for security and Survelliance / Nasir Baig

by Baig, Nasir | Supervised by Dr. Adil Masood Siddiqui.

Material type: Text Text Publisher: Rawalpindi, MCS (NUST), 2021Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.1,BAI (1).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.