Refine your search
Availability
-
Authors
- Anderson, Ross
- Aquilina, James M.
- Bishop, David
- Bishop, Matt
- Boyle, Randall
- Boyle, Randall J.
- Brown, Lawrie
- Caloyannides, Michael A.
- Campbell, Paul
- Cannon, David L.
- Chapple, Mike
- Chirillo, John
- Cole, Eric
- Erickson, Jon
- Gasser, Morrie
- Gollmann, Dieter
- Hankerson, Darrel R.
- Herrmann, Debra S.
- Honig, Andrew
- Katzenbeisser, Stefan
- Kaufman, Charlie
- Lindell, Yehuda
- Malin, Cameron H.
- Maloof, Marcus A.
- Mao, Wenbo
- Margulies, Jonathan
- Mattord, Herbert J.
- McClure, Stuart
- Mitnick, Kevin D.
- Nazario, Jose
- Panko, R. R.
- Perlman, Radia
- Petitcolas, Fabien A. P.
- Pfleeger, Charles P.
- Pfleeger, Shari Lawrence
- Pistoia, Marco
- Scambray, Joel
- Schneier, Bruce
- Sikorski, Michael
- Simon, William L.
- Solomon, Michael
- Speciner, Michael
- Stallings, William
- Stallings, William [author.]
- Tipton, Harold F.
- Vacca, John R.
- Vanstone, Scott A.
- Whitman, Michael E.
- Show more
- Show less
-
Holding libraries
- Central Library (CL)
- Centre for International Peace & Stability (CIPS)
- College of Electrical & Mechanical Engineering (CEME)
- Institute of Environmental Science and Engineering (IESE)
- Military College of Engineering (MCE)
- Military College of Signals (MCS)
- NUST Baluchistan Campus (NBC)
- NUST Law School (NLS)
- Pakistan Navy Engineering College (PNEC)
- School of Mechanical & Manufacturing Engineering (SMME)
- Show more
- Show less
-
Home libraries
- *
- *
- Central Library (CL)
- Centre for International Peace & Stability (CIPS)
- College of Electrical & Mechanical Engineering (CEME)
- Institute of Environmental Science and Engineering (IESE)
- Military College of Engineering (MCE)
- Military College of Signals (MCS)
- NUST Baluchistan Campus (NBC)
- NUST Law School (NLS)
- Pakistan Navy Engineering College (PNEC)
- School of Mechanical & Manufacturing Engineering (SMME)
- Show more
- Show less
-
Item types
-
Locations
-
Series
- --For dummies
- .NET developer series
- Addison-Wesley information technology series
- Addison-Wesley professional computing series
- Advanced information and knowledge processing
- Advances in information security
- Algorithms and combinatorics
- Artech House computer security series
- Artech House computing library
- Artech House technology management and professiona...
- Artech House telecommunications library
- Chapman & Hall/CRC cryptography and network securi...
- Cisco Press fundamentals series
- Essential skills made easy
- Exam cram 2
- For dummies
- Foundations and trends in theoretical computer sci...
- HackNotes
- IBM redbooks
- IEE telecommunications series
- IEEE Press series on information & communication n...
- Information security and cryptography
- Information systems security & assurance series
- Intelligent Systems, Control and Automation: Scien...
- ITSO networking series
- Java series (O’Reilly & Associates)
- Lecture notes in computer science
- London Mathematical Society lecture note series
- McGraw-Hill telecom professional
- Monographs in theoretical computer science
- Multimedia systems and applications
- Prentice Hall series in computer networking and di...
- Programmer to programmer
- Public administration and public policy
- Risk, Systems and Decisions
- Security series
- SEI series in software engineering
- Sybex serious skills
- Texts in theoretical computer science : an EATCS s...
- The Artech House optoelectronics library
- The ITSO networking series
- UNIX/C
- Wiley series in software design patterns
- William Stallings books on computer and data commu...
- Worldwide series in computer science
- Show more
- Show less
-
Places
- (Include CD)
- An Introduction to Computer Security The NIST Hand...
- Applications of data mining in computer security (...
- Building a secure computer system (E-BOOK)
- Computer networks --Security measures
- Computer security handbook.(E-BOOK)
- Data encryption (Computer science)
- Data protection
- Distributed systems security issues, processes, an...
- E-BOOK
- E-Book
- EB-604
- EBOOK
- Introduction to cryptography with Java applets(E-B...
- Java 2 network security /(E-BOOK)
- Show more
- Show less
-
Topics
- Business enterprises
- Coding theory
- Computer crimes
- Computer hackers
- Computer networks
- Computer security
- Computer software
- Computer viruses
- Computers
- COMPUTERS / Security / General
- Cryptography
- Data encryption (Computer science)
- Data protection
- Database security
- Dataskydd
- Datas�kerhet
- Debugging in computer science
- Digital watermarking
- Electronic commerce
- Electronic data processing
- Electronic data processing departments
- Electronic data processing personnel
- Firewalls (Computer security)
- Forensic sciences
- Hackers
- Human-computer interaction
- Information storage and retrieval systems
- Information technology
- Internet
- Intrusion detection systems (Computer security)
- IT-s䫥rhet
- IT-s�kerhet
- Java (Computer program language)
- Kryptering
- Kryptologi
- Machine learning
- Malware (Computer software)
- Penetration testing (Computer security)
- Privacy, Right of
- Public key infrastructure (Computer security)
- Risk assessment
- System design
- Telecommunication
- Telecommunication systems
- Web sites
- Show more
- Show less
-
Titles
