Results
|
1.
|
|
|
|
2.
|
|
|
|
3.
|
|
|
|
4.
|
|
|
|
5.
|
|
Fire walls: the complete reference by Strassberg, Keith | Richard, Gondek Gary, Rollie. Publication details: New York: McGraw-Hill/Osborne 2002Availability: Items available for loan: Main (1)Call number: QA76.9 .A25 S77x 2000.
|
|
6.
|
|
|
|
7.
|
|
protect yourself online by Danda, Matthew. Publication details: Washington Microsoft Press 2001Availability: Items available for loan: Main (1)Call number: TK5105.59 .D36 2001.
|
|
8.
|
|
|
|
9.
|
|
Principles of information security. by Whitman, Michael E | Mattord, Herbert J. Edition: 2nd ed. Publication details: Australia: Thomson Course Technology, 2005Availability: Items available for loan: Main (1)Call number: TK5105.59 .W54 2005.
|
|
10.
|
|
Management of information security. by Whitman, Michael E | Mattord, Herbert J. Publication details: Australia: Thomson Course Technology, 2004Availability: Items available for loan: Main (1)Call number: TK5105.59 .W54 2004.
|
|
11.
|
|
|
|
12.
|
|
|
|
13.
|
|
Computer forensics jumpstart by Solomon, Michael G. Edition: 2nd ed. Publication details: Indiana: Wiley Publishing, Inc., 2011Availability: Items available for loan: Main (1)Call number: QA76.9.A25 S6556 2011.
|
|
14.
|
|
Cryptography and network security by Gupta, Prakash C. Publication details: New Delhi: PHI Learning Private, 2015Availability: Items available for loan: Main (1)Call number: TK5105.59 .G86x 2015.
|
|
15.
|
|
Cryptography and network security by Kahate, Atul. Edition: 3rd ed. Publication details: New Delhi: McGraw-Hill Education, 2013Availability: Items available for loan: Main (1)Call number: TK5105.59 .K34x 2013.
|
|
16.
|
|
|
|
17.
|
|
|
|
18.
|
|
|
|
19.
|
|
Essential information security by Pitt, Cathy | Wieland, John. Publication details: Van Haren, 2013Availability: Items available for loan: Main (1)Call number: QA76.9.A25 P58x 2013.
|
|
20.
|
|
|