Your search returned 20 results.

Sort
Results
Network security how to plan for it and achieve it

by Baker, Richard H.

Material type: Text Text Publication details: New York McGraw Hill 1995Availability: Items available for loan: 1 Call number: 658.478 B16N.

Secure computers and networks analysis, design, and implementation

by Fisch, Eric A. White, Gregory B.

Material type: Text Text Publication details: Boca Raton CRC 2000Availability: Items available for loan: 1 Call number: 621.3853 F46S.

Sip security

by Sisalem, Dorgham | Floroiu, John jt.au.

Material type: Text Text Publication details: Chichester John Wiley and Sons 2009Availability: Items available for loan: 1 Call number: 005.8 S48S.

SSL and TLS Theory and practice

by Rolf, Oppliger.

Edition: 3rdMaterial type: Text Text Publication details: Boston Artech House 2009, 2023Availability: Items available for loan: 2 Call number: 005.8 O53S, ...

Hacker's handbook the strategy behind breaking into and defending networks

by Yound, Susan.

Material type: Text Text Publication details: Boca Raton Auerbach Publications 2003Availability: Items available for loan: 1 Call number: 005.8 Y7H.

Strategic information security

by Wylder, John.

Material type: Text Text Publication details: Boca Raton Auerbach Publications 2003Availability: Items available for loan: 1 Call number: 005.8 W96S.

Computer intrusion detection and network monitoring a statistical viewpoint

by Marchette, David J.

Material type: Text Text Publication details: New York Springer-Verlag 2001Availability: Items available for loan: 1 Call number: 005.8 M32C.

Managing cyber threats

by Kumar, Vipin Ed.

Material type: Text Text Publication details: New York Springer Science 2005Availability: Items available for loan: 1 Call number: 005.8 K98M.

Advances in security and payment methods for mobile commerce

by Hu, Wen-Chen.

Material type: Text Text Publication details: Hershey IDEA Group Publishing 2005Availability: Items available for loan: 1 Call number: 658.478 H86A.

Protocols for secure electronic commerce

by Sherif, Mostafa Hashem.

Material type: Text Text Publication details: Boca Raton CRC Press 2003Availability: Items available for loan: 1 Call number: 658.872028558 S39P.

Defense and detection strategies against internet worms

by Nazario, Jose.

Material type: Text Text Publication details: Boston Artech House 2004Availability: Items available for loan: 1 Call number: 005.84 N32D.

Know your enemy

Material type: Text Text Publication details: Boston Addison-Wesley 2004Availability: Items available for loan: 1 Call number: 005.8 K86.

Hacking exposed network security secrets and solutions

by Mcclure, Stuart | Scambray, Joel jt.au.

Material type: Text Text Publication details: New York McGraw-Hill 2005Availability: Items available for loan: 1 Call number: 005.8 M50H.

Cisco security

by Bhatnagar, Kartik.

Material type: Text Text Publication details: Ohio Premier Press 2002Availability: Items available for loan: 1 Call number: 005.8 B51C.

Security for mobile networks and platforms

by Assi, Selim | Dabbous, Nora jt.au.

Material type: Text Text Publication details: Boston Artech House 2006Availability: Items available for loan: 1 Call number: 005.8 A27S.

Network security

by Harrington, Jan L.

Material type: Text Text Publication details: Noida Elsevier 2005Availability: Items available for loan: 1 Call number: 005.8 H32 N.

Cybersecurity Geopolitics, Law, and Policy.

by Guiora, Amos N.

Material type: Text Text Publication details: UK Routledge 2017Availability: Items available for loan: 1 Call number: 005.8 G95C.

Computer Security Principles and Practice.

by Wyatt, Dariel.

Material type: Text Text Publication details: USA Willford Press 2019Availability: Items available for loan: 1 Call number: 005.8 W96C.

Cybersecurity fundamentals : understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals

by Goutam, Rajesh Kumar.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: India BPB 2021Availability: Items available for loan: 1 Call number: 004.6780289 G60C.

Cyber safety for everyone : understand the interplay between the internet and one’s social and mental well-being learn how to file a cybercime complaint discover the new it rules 2021 understand tne artificial intelligence (Al) in cybersecurity

by Teens, Jaago.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: India BPB 2022Availability: Items available for loan: 1 Call number: 004.6780289 T25C.

Pages

Powered by Koha