Refine your search

Your search returned 64 results.

Not what you expected? Check for suggestions
Safe and secure : secure your home network, and protect your privacy online / Arman Danesh, Felix Lau, and Ali Mehrassa.

by Danesh, Arman | Lau, Felix | Mehrassa, Ali.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, Ind. : Sams, c2002Availability: Items available for loan: Institute of Environmental Science and Engineering (IESE)Call number: 005.8 (1).
Security in computing Pfleeger, Shari Lawrence.

by Charles P Pfleeger.

Edition: 3rd Publisher: New Delhi :, Prentice-Hall of India Pvt.Ltd. 2006Availability: Items available for loan: Central Library (CL)Call number: 005.8 PFL (5).
Security in computing Charles P. Pfleeger.

by Pfleeger, Charles P.

Edition: 2nd ed. Publisher: Upper Saddle River, NJ : Prentice Hall PTR, c1997Availability: Items available for loan: Central Library (CL)Call number: 005.8 PFL (1).
Security in computing Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P | Pfleeger, Shari Lawrence.

Edition: 4th ed. Publisher: Upper Saddle River, NJ : Prentice Hall, c2007Online access: Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 PFL (3).
PC week intranet and internet firewall strategies Edward Amoroso and Ronald Sharp.

by Amoroso, Edward G | Sharp, Ronald.

Publisher: Emeryville, Calif. : Ziff-Davis Press, c1996Other title: PC week intranet and internet firewall strategies | Intranet and internet firewall strategies.Availability: Items available for loan: Central Library (CL)Call number: 005.8 AMO (1).
Techniques and applications of digital watermarking and content protection Michael Arnold, Martin Schmucker, Stephen D. Wolthusen.

by Arnold, Michael | Schmucker, Martin | Wolthusen, Stephen D.

Publisher: Boston : Artech House, c2003Other title: Digital watermarking and content protection.Availability: Items available for loan: Central Library (CL)Call number: 005.8 ARN (1).
Information hiding techniques for steganography and digital watermarking Stefan Katzenbeisser, Fabien A.P. Petitcolas, editors

by Katzenbeisser, Stefan [edt] | Petitcolas, Fabien A. P [edt].

Publisher: Boston : Artech House, cop. 2000Availability: Items available for loan: Central Library (CL)Call number: 005.8 KAT (3).
Enterprise security Robert C. Newman

by Newman, Robert C.

Publisher: New Delhi : Pearson Education Inc., c2003Availability: Items available for loan: Central Library (CL)Call number: 005.8 NEW (2).
Implementing database security and auditing Ron Ben Natan

by Ben-Natan, Ron.

Publisher: India : Elsevier Digital Press, c2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 BEN (2).
Digital data integrity: the evolution from passive protection to active management the evolution from passive protection to active management David B. Little, Skip Farmer, Oussama El-Hilali

by Little, David B | Farmer, Skip | El-Hilali, Oussama.

Publisher: Chichester : John Wiley, 2007Availability: Items available for loan: Central Library (CL)Call number: 005.8 LIT (1).
Privacy protection and computer forensics Michael A. Caloyannides.

by Caloyannides, Michael A | Caloyannides, Michael A.

Edition: 2nd ed. Publisher: Boston : Artech House, c2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 CAL (1).
Information security illuminated Michael G. Solomon, Mike Chapple

by Solomon, Michael G | Chapple, Mike.

Publisher: Boston : Jones and Bartlett, 2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 SOL (1).
Access control in data management systems Elena Ferrari

by Ferrari, Elena | Elena Ferrari.

Publisher: M&C Publishing 2010Availability: Items available for loan: Central Library (CL)Call number: 005.8 FER (1).
Counter hack : a step-by-step guide to computer attacks and effective defenses Ed Skoudis.

by Skoudis, Ed.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c2002Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 SKO (1).
Cyber security standards, practices and industrial applications : systems and methodologies / Junaid Ahmed Zubairi, Athar Mahboob.

by Zubairi, Junaid Ahmed | Zubairi, Junaid Ahmed, 1961- | Mahboob, Athar, 1971-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Hershey, PA : Information Science Reference, c2012Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 ZUB (1).
Information hiding techniques for steganography and digital watermarking / Stefan Katzenbeisser, Fabien A.P. Petitcolas, editors.

by Katzenbeisser, Stefan | Katzenbeisser, Stefan | Petitcolas, Fabien A. P.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Artech House, 2000Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 KAT (1).
The computer privacy handbook / Andre Bacard

by Bacard, Andr⥮.

Publisher: Berkeley, CA : Peachpit Press, c1995Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,BAC (1).
Protection and security on the information superhighway / Frederick B. Cohen.

by Cohen, Frederick B.

Publisher: New York : Wiley, c1995Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,COH (2).
Security in computing / Charles P. Pfleeger.

by Pfleeger, Charles P.

Edition: 2nd Edition Publisher: USA Prentice Hall 1997Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,PFL (1).
Information hiding techniques for steganography and digital water marking / Stefan Katzenbeisser, Fabien A.P. Petitcolas, editors.

by Katzenbeisser, Stefan | Katzenbeisser, Stefan | Petitcolas, Fabien A. P.

Edition: Computer Security Series Publisher: Boston : Artech House, 2000Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,KAT (1).
Information security management handbook / Micki Krause, Harold F. Tipton, editors.

by Krause, Micki | Tipton, Harold F.

Edition: 5th ed. Publisher: Boca Raton, FL : CRC press 2004Online access: Publisher description Availability: Items available for reference: Military College of Signals (MCS) Not for loanCall number: 658.0558,INF (1). :
Information security management handbook: volume 2 Harold F. Tipton, Micki Krause, editors.

by Krause, Micki | Tipton, Harold F.

Edition: 5th ed. Publisher: Boca Raton, Fl : Auerbach, 2003-<2006>Online access: Publisher description Availability: Items available for reference: Military College of Signals (MCS) Not for loanCall number: 658.0558,INF (1). :
Security in computing / Charles P. Pfleeger.

by Pfleeger, Charles P.

Edition: 2nd ed. Publisher: Upper Saddle River, NJ : Prentice Hall PTR, c1997Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 PFL (9).
Cryptography and data security / Dorothy Elizabeth Robling Denning.

by Denning, Dorothy Elizabeth Robling.

Publisher: Reading, Mass. : Addison-Wesley, c1982Availability: Items available for loan: Military College of Signals (MCS)Call number: 001.640289 DEN (1).
Commonsense computer security : your practical guide to preventing accidental and deliberate electronic data loss / Martin R. Smith.

by Smith, Martin R.

Publisher: London ; New York : McGraw-Hill, c1989Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,SMI (1).
Data privacy and security / David Salomon.

by Salomon, D.

Publisher: New York : Springer, 2003Online access: Publisher description | Table of contents Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,SAL (1).
Enterprise security / Robert C. Newman.

by Newman, Robert C.

Edition: low priced Publisher: Upper Saddle River, N.J. : Prentice Hall, c2003Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,NEW (1).
Privacy protection and computer forensics / Michael A. Caloyannides.

by Caloyannides, Michael A | Caloyannides, Michael A.

Edition: 2nd ed. Publisher: Boston : Artech House, c2004Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,CAL (1).
Power Analysis Attacks : Revealing the Secrets of Smart Cards / Stefan Mangard, Elisabeth Oswald, Thomas Popp.

by Mangard, Stefan | Oswald, Elisabeth | Popp, Thomas | SpringerLink (Online service).

Publisher: Boston, MA : Springer Science+Business Media, LLC, 2007Online access: Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,MAN (1).
Cryptography and data security / Dorothy Elizabeth Robling Denning.

by Denning, Dorothy Elizabeth Robling.

Publisher: Reading, Mass. : Addison-Wesley, c1982Availability: Items available for loan: Military College of Signals (MCS)Call number: 001.640289,DEN (1).
Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs.

by Jacobs, Stuart.

Publisher: Hoboken, N.J. : Wiley : IEEE Press, c2011Availability: No items available : Checked out (1).
Information Technology Law / Diane Rowland, Uta Kohl, Andrew Charlesworth.

by Rowland, Diane | Charlesworth, Andrew, 1966- | Kohl, Uta.

Edition: 4th ed. Publisher: Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2011Availability: Items available for reference: Military College of Signals (MCS) Not for loanCall number: 343.410999,ROW (1). :
Cryptography and network security (E-Book_ principles and practices / William Stallings

by Stallings, William.

Edition: 2. ed. Publisher: Upper Saddle River, N.J. : Prentice Hall, cop. 1999Availability: Items available for loan: (1).
Malware: fighting malicious code - (E-BOOK) Ed Skoudis with Lenny Zeltser

by Skoudis, Ed | Zeltser, Lenny.

Publisher: Upper Saddle River, N.J. ; London : Prentice Hall PTR, cop. 2004Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 SKO (1).
Web security portable reference(E-BOOK) Mike Shema

by Shema, Mike.

Publisher: New York : McGraw-Hill/Osborne, cop. 2003Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 SHE (1).
Computer privacy annoyances(E-BOOK) how to avoid the most annoying invasions of your personal and online privacy / Dan Tyan.

by Tynan, Dan.

Edition: 1st ed. Publisher: Sebastopol, CA ; Farnham : O'Reilly Media, c2005Online access: Publisher description Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 TYA (1).
Security for Web Services and Service-Oriented Architectures(E-BOOK) by Elisa Bertino, Lorenzo Martino, Federica Paci, Anna Squicciarini.

by Bertino, Elisa | Martino, Lorenzo | Paci, Federica | Squicciarini, Anna | SpringerLink (Online service).

Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010Online access: Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online Availability: Items available for loan: Military College of Signals (MCS) (1).
Payment card industry data security standard handbook -(E-BOOK) Timothy M. Virtue.

by Virtue, Timothy M.

Publisher: Hoboken, N.J. : John Wiley & Sons, c2009Online access: Table of contents only Availability: Items available for loan: Military College of Signals (MCS)Call number: 332.17 VIR (1).
Information security :design, implementation, measurement, and compliance -(E-BOOK) Timothy P. Layton.

by Layton, Timothy P.

Publisher: Boca Raton : Auerbach Publications, c2007Online access: Publisher description Availability: Items available for loan: Military College of Signals (MCS)Call number: 658.478 LAY (1).
Investigator's guide to steganography(E-BOOK) Gregory Kipper.

by Kipper, Gregory.

Publisher: Boca Raton, FL : Auerbach Publications, c2004Online access: Publisher description Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8/2 KIP (1).
Security in computing / Charles P. Pfleeger

by Pfleeger, Charles P.

Edition: 2nd ed. Publisher: Upper Saddle River, N.J. : Prentice Hall, cop. 1997Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 PFL (1).
Advances in information security and assurance : third international conference and workshops, ISA 2009, Seoul, Korea, June 25-27, 2009 : proceedings / Jong Hyuk Park ... [et al.] (eds.).

by Park, Jong Hyuk.

Publisher: Berlin ; New York : Springer, 2009Other title: ISA 2009.Availability: Items available for loan: Military College of Signals (MCS)Call number: 004 PAR (1).
Analyzing computer security : a threat/vulnerability/countermeasure approach / Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P | Pfleeger, Shari Lawrence.

Publisher: Upper Saddle River, NJ : Prentice Hall, c2012Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,PFL (1).
Principle of Computer Security Com TIA Security +TM and Beyond, lab manual / Vincent Nestler ... [et al.].

by Nestler, Vincent J.

Edition: 2nd ed. Publisher: New York : McGraw-Hill Osborne Media, c2011Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,VIN (1).
Security in computing (E-BOOK) Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies.

by Pfleeger, Charles P | Margulies, Jonathan | Pfleeger, Shari Lawrence.

Edition: Fifth edition. Availability: Items available for loan: Military College of Signals (MCS) (1).
Security in computing (E-BOOK) Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P | Pfleeger, Shari Lawrence.

Edition: 4th ed. Publisher: Upper Saddle River, NJ : Prentice Hall, c2007Online access: Table of contents only Availability: Items available for loan: Military College of Signals (MCS) (1).
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P | Pfleeger, Shari Lawrence.

Edition: 4th ed. Publisher: Upper Saddle River, NJ : Prentice Hall, c2009Online access: Table of contents only Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,PFL (2).
Legal issues in information security / Joanna Lyn Grama.

by Grama, Joanna Lyn.

Edition: Second edition. Availability: Items available for reference: Military College of Signals (MCS) Not for loanCall number: 342.7308,GRA (1). :
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.