Your search returned 77 results.

Sort
Results
Principles of incident response and disaster recovery

by Whitman, Michael E | Mattord, Herbert J. jt.au.

Material type: Text Text Publication details: Australia Thomson Course Technology 2007Availability: Items available for loan: 1 Call number: 658.478 W42P.

Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography

by Dube, Roger.

Material type: Text Text Publication details: Hoboken John Wiley and Sons 2008Availability: Items available for loan: 1 Call number: 005.8 D80H.

Statistical techniques for network security modern statistically-based intrusion detection and protection

by Wang, Yun.

Material type: Text Text Publication details: Hershey Information Science Reference 2008Availability: Items available for loan: 1 Call number: 005.8 W17S.

Real design forensics computer security and incident response

by Jones, Keith J | Bejtlich, Richard jt.au.

Material type: Text Text Publication details: Upper Saddle River Pearson Edication 2006Availability: Items available for loan: 1 Call number: 005.8 J57R.

Network security

by Harrington, Jan L.

Material type: Text Text Publication details: Noida Elsevier 2005Availability: Items available for loan: 1 Call number: 005.8 H32 N.

Computer security art and science

by Bishop, Matt.

Material type: Text Text Publication details: Delhi Pearson Education 2003Availability: Items available for loan: 1 Call number: 621.3853 B55C.

Computer security art and science

by Bishop, Matt.

Material type: Text Text Publication details: Delhi Pearson Education 2003Availability: Items available for loan: 1 Call number: 621.3853 B55C.

Computer security art and science

by Bishop, Matt.

Material type: Text Text Publication details: Delhi Pearson Education 2003Availability: Items available for loan: 4 Call number: 621.3853 B55C, ...

Computer security art and science

by Bishop, Matt.

Material type: Text Text Publication details: Delhi Pearson Education 2003Availability: Items available for loan: 1 Call number: 621.3853 B55C.

Handbook of electronic security and digital forensics

by Jahankhani, Hamid.

Material type: Text Text Publication details: Hackensack World Scientific Publishing New Jersey 2010Availability: Items available for loan: 1 Call number: 658.478 BJ20H.

Security for microsoft visual basic.net

by Robinson,Ed.

Material type: Text Text Publication details: U.S.A. Tata McGraw-Hill publishing company limited 2003Availability: Items available for loan: 1 Call number: 621.3853 R62S.

Engineering safe and secure software systems

by Axelrod, C. Warren.

Material type: Text Text Publication details: USA Artech House 2013Availability: Items available for loan: 2 Call number: 621.381952 A95E, ...

Machine Learning and Security Protecting Systems with Data and Algorithms.

by Chio, Clarence.

Material type: Text Text Publication details: Germany Shroff/O'Reilly 2018Availability: Items available for loan: 2 Call number: 006.31 C34M, ...

Network Intrusion Detection using Deep Learning A feature learning approach

by Kim, Kwangjo.

Series: Springer briefs on cyber security systems and networksMaterial type: Text Text Publication details: singapore Springer 2018Availability: Items available for loan: 2 Call number: 006.31 K60N, ...

Cybersecurity Geopolitics, Law, and Policy.

by Guiora, Amos N.

Material type: Text Text Publication details: UK Routledge 2017Availability: Items available for loan: 1 Call number: 005.8 G95C.

Computer Security Principles and Practice.

by Wyatt, Dariel.

Material type: Text Text Publication details: USA Willford Press 2019Availability: Items available for loan: 1 Call number: 005.8 W96C.

Cyber security : understanding cyber crimes, computer forensics and legal perspectives

by Godbole, Nina | Belapure, Sunit.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: India Wiley 2011Availability: Items available for loan: 1 Call number: 005.8 G43C.

Pages

Powered by Koha