Your search returned 234 results.

Sort
Results
221.
Computer security by
Edition: 2nd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J: Wiley, 2006
Availability: Items available for loan: ACL (1)Call number: 005.8 GOL.

222.
Contemporary security studies by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Oxford: Oxford University Press, 2007
Availability: Items available for loan: ACL (1)Call number: 355.033 COL.

223.
Contemporary security studies by
Edition: 2nd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Oxford: Oxford University Press, 2010
Availability: Items available for loan: ACL (1)Call number: 355.033 COL.

224.
Cryptography and network security by
Edition: 2nd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi: Tata McGraw Hill, 2010
Availability: Items available for loan: ACL (1)Call number: 005.82 KAH.

225.
Cryptography and network security by
Edition: 3rd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi: McGraw Hill Education (India) Pvt Ltd, 2016
Availability: Items available for loan: ACL (1)Call number: 005.82 KAH.

226.
Cryptography and network security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York: McGraw-Hill Higher Education, 2016
Availability: Items available for loan: ACL (1)Call number: 005.8 FOR.

227.
Crises in the contemporary Persian Gulf by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London ; Portland, OR: F. Cass, 2002
Availability: Items available for loan: ACL (1)Call number: 327.09536 RUB.

228.
Cybersecurity operations handbook by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam ; Boston: Elsevier Digital Press, 2003
Availability: Items available for loan: ACL (2)Call number: 005.8 RIT, ...

229.
Defeating terrorism : shaping the new security environment by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Guilford, Conn: McGraw-Hill Companies, 2004
Availability: Items available for loan: ACL (2)Call number: 363.320973 HOW, ...

230.
End-to-end network security : defense-in-depth by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Ind: Cisco Press, 2008
Availability: Items available for loan: ACL (1)Call number: 005.8 SAN.

231.
Encyclopaedia of information security risk analysis v.2 : Security risk management : building an information security by
Edition: 1st ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London: Koros Press Limited, 2016
Availability: Items available for loan: ACL (1)Call number: 005.8 DIS.

232.
Effective Oracle database 10g security by design by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi: McGraw-Hill/Osborne ; Oracle Press, Tata McGraw Hill Education Private Limited, 2004
Availability: Items available for loan: ACL (1)Call number: 005.7575O KNO.

233.
Effective Oracle database 10g security by design by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Emeryville, CA: McGraw-Hill/Osborne ; Oracle Press, 2004
Availability: Items available for loan: ACL (1)Call number: 005.8 KNO.

234.
Encyclopaedia of cyber law & computer security : measures, controls & practices by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London: Koros Press Limited, 2015
Availability: Items available for loan: ACL (2)Call number: 343.7309944 MOO, ...

Pages

Powered by Koha