Refine your search

Your search returned 131 results.

21. Books
Cryptography and network security : principles and practice / William Stallings

by Stallings, William.

Edition: 2nd ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Upper Saddle River, N.J. : Prentice Hall, c1999Accession number(s): 200207020052.Availability: Items available for loan: Main Campus [Call number: TK5105.59 S724C 1999] (1).

22. Books
Cryptography and network security / Behrouz A. Forouzan

by Forouzan, Behrouz A.

Edition: McGraw-Hill international ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Boston, Mass. : McGraw Hill, 2008Accession number(s): 200810240027.Availability: Items available for loan: Main Campus [Call number: TK5105.59 F676C 2008] (1).

23. Books
Cryptography for Internet and database applications : developing secret and public key techniques with Java / Nick Galbreath

by Galbreath, Nick.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Indianapolis, Ind. : Wiley, c2002Accession number(s): 200303250007.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 G342C] (1).

24.
Cyber security and network security / edited by Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha.

by Pramanik, Sabyasachi [editor.] | Samanta, Debabrata, 1987- [editor.] | Vinay, M [editor.] | Guha, Abhijit [editor.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, NJ : Beverly, MA : Wiley ; Scrivener Publishing, 2022Online access: EBSCOhost Availability: No items available

25. Books
Cyber security policy guidebook / Jennifer L. Bayuk ... [et al.].

by Bayuk, Jennifer L.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Hoboken, N.J. : Wiley, c2012Accession number(s): 201312170007.Availability: Items available for loan: Main Campus [Call number: QA 76.9 .A25 C923] (1).

26.
Cyber terrorism [electronic resource] : a guide for facility managers / by Joseph F. Gustin.

by Gustin, Joseph F, 1947-.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Lilburn, Ga. : Fairmont Press, c2004Online access: Electronic Resources Availability: No items available

27. Books
Cybercrime & security. Binder 2 / compiled & edited by Pauline C. Reich

by Reich, Pauline C.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Dobbs Ferry, N.Y. : Oceana, c1999Other title: Cybercrime and security.Accession number(s): 200611130070.Availability: Items available for loan: Main Campus [Call number: HV6773 C923] (1).

28. Books
Cybercrime & security. Binder 1 / compiled & edited by Pauline C. Reich

by Reich, Pauline C [comp. and ed.].

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Dobbs Ferry, N.Y. : Oceana, c2006Other title: Cybercrime and security.Accession number(s): 200611130069.Availability: Items available for loan: Main Campus [Call number: HV6773 C923] (1).

29. Books
Cybercrime & security. Binder 3 / compiled & edited by Pauline C. Reich

by Reich, Pauline C [comp. and ed.].

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Dobbs Ferry, N.Y. : Oceana, c2006Other title: Cybercrime and security.Accession number(s): 200611130071.Availability: Items available for loan: Main Campus [Call number: HV6773 C923] (1).

30.
Cyberwarefare : an introduction to information-age conflict / Issac R. Porche III

by Porche, Isaac, 1968- [author].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston : Artech House, 2020Online access: Electronic Resources Availability: No items available

31. Books
Data mining tools for malware detection / Mehedy Masud, Latifur Khan, and Bhavani Thuraisingham.

by Masud, Mehedy | Khan, Latifur | Thuraisingham, Bhavani.

Material type: book Book; Format: print ; Literary form: Not fiction ; Audience: Specialized; Publisher: Boca Raton, Fla. : CRC Press, c2012Accession number(s): 201405260006.Availability: Items available for loan: Main Campus [Call number: QA76.9.D343 M378D 2012] (1).

32. Books
Database systems : design, implementation, and management / Peter Rob, Carlos Coronel

by Rob, Peter | Coronel, Carlos.

Edition: 8th ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Australia : Thomson/Course Technology, c2009Accession number(s): 200901090009, 200901140010, 200901140011.Availability: Items available for loan: Main Campus [Call number: QA76.9 .D26 R62D 2009] (1).

33. Books
Designing network security / Merike Kaeo

by Kaeo, Merike.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Indianapolis, Ind. : Cisco Press, c1999Accession number(s): 200401080164, 200401080165, 200402070005.Availability: Items available for loan: Main Campus [Call number: TK5105.59 K336D] (1).

34.
Designing security architecture solutions [electronic resource] / Jay Ramachandran.

by Ramachandran, Jay.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York, N.Y. : John Wiley, 2002Online access: Electronic Resources Availability: No items available

36. Books
Digital signatures / Mohan Atreya ... [et al.]

by Atreya, Mohan.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New York, N.Y. : McGraw-Hill/Osborne, c2002Accession number(s): 200207020065, 200304090043, 200304090044.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 D534] (1).

37. Books
Dr. Tom Shinder's configuring ISA server 2004 / Thomas W. Shinder, Debra Littlejohn Shinder

by Shinder, Thomas W | Shinder, Debra Littlejohn.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Rockland, Mass. : Syngress, c2005Accession number(s): 200503260019.Availability: Items available for loan: Main Campus [Call number: QA76.9 .C55 S546D] (1).

38. Books
Effective Oracle database 10g security by design / David Knox

by Knox, David.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New York, N.Y. : Oracle Press, c2004Accession number(s): 200412240007.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 K569E] (1).

39. Books
Enterprise information systems assurance and system security : managerial and technical issues / [edited by] Merrill Warkentin and Rayford B. Vaughn

by Warkentin, Merrill [ed.] | Vaughn, Rayford B, 1947- [ed.].

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pa. : Idea Group, c2006Accession number(s): 200707200193, 200707200194.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 E573] (1).

40. Books
Essential Check Point FireWall-1 NG : an installation configuration, and troubleshooting guide / Dameon D. Welch-Abernathy

by Welch-Abernathy, Dameon D.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Boston, Mass. : Addison-Wesley, c2004Accession number(s): 200405290031, 200405290032.Availability: Items available for loan: Main Campus [Call number: TK5105.59 W442E] (1).


- Copyright © 2022 Library and Learning Space -

Powered by Koha