Refine your search
Availability
-
Authors
- Allen, Julia H.
- Baker, Richard H.
- Boyle, Randall
- Breithaupt, Jim
- Brenton, Chris
- Brown, Lawrie
- Campbell, Paul
- Cannon, David L.
- Carvey, Harlan A.
- Chirillo, John
- Chuvakin, Anton
- Cole, Eric
- Conley, James W.
- Deal, Richard A.
- Dondeti, Lakshminath R.
- Erickson, Jon
- Forouzan, Behrouz A.
- Gregg, Michael
- Hardjono, Thomas
- Harkins, Dan
- Hubaux, Jean-Pierre
- Hunt, Cameron
- Kabatiansky, G.
- Kaufman, Charlie
- Kim, David
- Krutz, Ronald L.
- Maiwald, Eric
- Mather, Tim
- Mattord, Herbert J.
- Merkow, Mark S.
- Nazario, Jose
- Panko, R. R.
- Panko, Raymond R.
- Peltier, Thomas R.
- Perlman, Radia
- Pistoia, Marco
- Ramamurthy, Byrav
- Schneier, Bruce
- Semenov, S.
- Skoudis, Ed
- Solomon, Michael
- Speciner, Michael
- Stallings, William
- Stallings, William [author.]
- Vacca, John R.
- Whitman, Michael E.
- Winkler, J. R.
- Xu, Chengzhong
- Show more
- Show less
-
Holding libraries
- Central Library (CL)
- Centre for International Peace & Stability (CIPS)
- College of Electrical & Mechanical Engineering (CEME)
- Institute of Environmental Science and Engineering (IESE)
- Military College of Signals (MCS)
- Pakistan Navy Engineering College (PNEC)
- School of Mechanical & Manufacturing Engineering (SMME)
- Show more
- Show less
-
Home libraries
- *
- *
- Central Library (CL)
- Centre for International Peace & Stability (CIPS)
- College of Electrical & Mechanical Engineering (CEME)
- Institute of Environmental Science and Engineering (IESE)
- Military College of Signals (MCS)
- Pakistan Navy Engineering College (PNEC)
- School of Mechanical & Manufacturing Engineering (SMME)
- Show more
- Show less
-
Item types
-
Locations
-
Series
- --For dummies
- A Nutshell handbook
- Advances in information security
- Artech House computer security series
- Artech House telecommunications library
- Artech House universal personal communications ser...
- Bruce Perens' Open source series
- Bruce Perens' Open Source series
- BTexact communications technology series
- CCIE self-study
- Chapman & Hall/CRC computer and information scienc...
- Cisco Press fundamentals series
- Cisco Press networking technology series
- Essential skills made easy
- First-step series
- HackNotes
- IEEE Press series on information & communication n...
- IEEE series on network management
- Information security and cryptography
- Information security series
- Information systems security & assurance series
- Information technology--transmission, processing, ...
- ITSO networking series
- Lecture notes in computer science
- McGraw-Hill Forouzan networking series
- Networking technology series
- Prentice Hall series in computer networking and di...
- Prentice-Hall PTR Web infrastructure series
- SEI series in software engineering
- Studies in computational intelligence
- Sybex serious skills
- The Artech House optoelectronics library
- The Charles F. Goldfarb series on open information...
- The ITSO networking series
- The Radia Perlman series in computer networking an...
- The Sei series in software engineering
- Theory in practice
- What you need to know
- William Stallings books on computer and data commu...
- Show more
- Show less
-
Places
-
Topics
- Business enterprises
- Cloud computing
- Coding theory
- Computer crimes
- Computer hackers
- Computer network protocols
- Computer networks
- Computer networks -- Security measures | Coding t...
- Computer networks--Security measures
- Computer security
- Computer viruses
- Computers
- COMPUTERS / Security / General
- Computersicherheit
- Cryptography
- Data encryption (Computer science)
- Data protection
- Dataskydd
- Electronic commerce
- Electronic data processing departments
- Electronic data processing personnel
- Extranets (Computer networks)
- Firewalls (Computer security)
- Hackers
- Hacking
- Information storage and retrieval systems
- Information technology
- Internet
- Intranets (Computer networks)
- Intrusion detection systems (Computer security)
- IT-s䫥rhet
- IT-s�kerhet
- Java (Computer program language)
- Management information systems
- Penetration testing (Computer security)
- Privacy, Right of
- Public key infrastructure (Computer security)
- Risk assessment
- Routers (Computer networks)
- Web sites
- Wireless communication systems
- World Wide Web
- Show more
- Show less
-
Titles
