Results
|
221.
|
|
Computer security by
Edition: 2nd ed
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Hoboken, N.J: Wiley, 2006
Availability: Items available for loan: ACL (1)Call number: 005.8 GOL.
|
|
222.
|
|
Contemporary security studies by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Oxford: Oxford University Press, 2007
Availability: Items available for loan: ACL (1)Call number: 355.033 COL.
|
|
223.
|
|
Contemporary security studies by
Edition: 2nd ed
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Oxford: Oxford University Press, 2010
Availability: Items available for loan: ACL (1)Call number: 355.033 COL.
|
|
224.
|
|
Cryptography and network security by
Edition: 2nd ed
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi: Tata McGraw Hill, 2010
Availability: Items available for loan: ACL (1)Call number: 005.82 KAH.
|
|
225.
|
|
Cryptography and network security by
Edition: 3rd ed
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi: McGraw Hill Education (India) Pvt Ltd, 2016
Availability: Items available for loan: ACL (1)Call number: 005.82 KAH.
|
|
226.
|
|
Cryptography and network security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York: McGraw-Hill Higher Education, 2016
Availability: Items available for loan: ACL (1)Call number: 005.8 FOR.
|
|
227.
|
|
Crises in the contemporary Persian Gulf by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: London ; Portland, OR: F. Cass, 2002
Availability: Items available for loan: ACL (1)Call number: 327.09536 RUB.
|
|
228.
|
|
Cybersecurity operations handbook by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Amsterdam ; Boston: Elsevier Digital Press, 2003
Availability: Items available for loan: ACL (2)Call number: 005.8 RIT, ...
|
|
229.
|
|
|
|
230.
|
|
End-to-end network security : defense-in-depth by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Indianapolis, Ind: Cisco Press, 2008
Availability: Items available for loan: ACL (1)Call number: 005.8 SAN.
|
|
231.
|
|
|
|
232.
|
|
Effective Oracle database 10g security by design by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi: McGraw-Hill/Osborne ; Oracle Press, Tata McGraw Hill Education Private Limited, 2004
Availability: Items available for loan: ACL (1)Call number: 005.7575O KNO.
|
|
233.
|
|
Effective Oracle database 10g security by design by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Emeryville, CA: McGraw-Hill/Osborne ; Oracle Press, 2004
Availability: Items available for loan: ACL (1)Call number: 005.8 KNO.
|
|
234.
|
|
|