Results
|
21.
|
|
Certified secure computer use Publication details: EC-Council, n.dAvailability: Items available for loan: (1). Main (9)Call number: QA76 .F68x n.d, ...
|
|
22.
|
|
CompTIA security+ study guide: exam SY0-301 by Dulaney, Emmett. Edition: 5th ed. Publication details: Indianapolis: Wiley Technology, 2011Availability: Items available for loan: Main (1)Call number: QA76.3 .D8228 2011.
|
|
23.
|
|
CompTIA® Security+™ study guide: SYO-401 by Dulaney, Emmett | Easttom, Chuck. Edition: 6th ed. Publication details: Hoboken: John Wiley & Sons, 2014Availability: Items available for loan: Main (1)Call number: QA76.3 .D8229 2014.
|
|
24.
|
|
API security in action by Madden, Neil. Publication details: Shelter Island, NY: Manning Publications, 2020Availability: Items available for loan: Main (1)Call number: QA76.76.A65 M317 2020.
|
|
25.
|
|
|
|
26.
|
|
|
|
27.
|
|
Secrets of a cyber security architect by Schoenfield, Brook S. E. Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boca Raton, FL: CRC Press, 2023Availability: Items available for loan: Main (1)Call number: TK5105.59 .S36x 2023.
|
|
28.
|
|
|
|
29.
|
|
|
|
30.
|
|
|
|
31.
|
|
|
|
32.
|
|
Information security and cyber laws by Mishra, Amit Kumar. Edition: 2nd ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi: S.K. Kataria & Sons, 2024Availability: Items available for loan: Main (1)Call number: QA76.9 .A25 M57x 2024.
|
|
33.
|
|
Cryptography and network security by Chaudhary, Vikas | Garg, Kanika. Edition: 3rd ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi: S.K. Kataria & Sons, 2024Availability: Items available for loan: Main (1)Call number: TK5105.59 .C43x 2024.
|
|
34.
|
|
Hacking: be a hacker with ethics by Bohra, Harsh. Edition: Rev ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi: KHANNA Book, 2018Availability: Items available for loan: Main (1)Call number: QA76.9.A25 B68x 2018.
|
|
35.
|
|
|
|
36.
|
|
Protect your windows network: from perimeter to data by Johansson, Jesper M | Steve, Riley. Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River: Pearson Education, 2005Availability: Items available for loan: Main (1)Call number: QA76.9.A25 J62 2005.
|