|
|
UNIX system security : how to protect your data and prevent intruders / Rik Farrow.
by Farrow, Rik, 1950-. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Reading, Mass. : Addison-Wesley Pub. Co., c1991Availability: No items available
|
|
|
UNIX System Security:How to Protect Your Data and Prevent Intruders
by Farrow, Rik. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts Addison-Wesley 1994Availability: Items available for loan:
[Call number: 621.38195 F249U]
(1).
|
|
|
Data and Computer Communications
by Stallings, William. Edition: 5Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi Prentice-Hall of India 2001Availability: Items available for loan:
[Call number: 621.38195404 S775D]
(1).
|
|
|
Introduction to Operating Systems
by Deitel, H.M. Edition: 2Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi Pearson Education Asia 2001Availability: No items available
|
|
|
Introduction to Operating Systems
by Deitel, H.M. Edition: 2Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi Pearson Education Asia 2001Availability: Items available for loan:
[Call number: 621.3819642 D324I]
(1).
|
|
|
Introduction to Operating Systems
by Deitel, H.M. Edition: 2Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi Pearson Education Asia 2001Availability: Items available for loan:
[Call number: 621.3819642 D324I]
(2).
|
|
|
Operating System Concepts
by Silberschatz, A | Galvin, Peter Baer. Edition: 5Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York John Wiley & Sons 2000Availability: Items available for loan:
[Call number: 621.381951 S582O]
(1).
|
|
|
Civil Engineering for Disaster Risk Reduction
by Kolathayar, Sreevalsa | Pal, Indrajit | Chian,Siau Chen | Mondal,Arpita. Publisher: Singapore Springer 2022Availability: Items available for reference:
[Call number: 624 K93C]
(1).
|
|
|
Network Security Essentials:Applications and Standards 4
by Stallings. William. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi Pearson 2012Availability: Items available for loan:
[Call number: 621.38195404 S775]
(1).
|
|
|
Computer Networks
by Peterson,Larry L | Davie,Bruce S. Edition: 5Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi Elsevier 2014Availability: Items available for loan:
[Call number: 621.38195404 P973]
(1).
|
|
|
Operating System Principles
by Silberschatz,Abraham | Galvin, Peter Bear | Gagne, Greg. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi Wiley 2004Availability: Items available for loan:
[Call number: 621.381951 S563]
(1).
|
|
|
Operating System Concepts
by Silberschatz,Abraham | Galvin, Peter Baer | Gagne, Greg. Edition: 6Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York John Wiley 2002Availability: Items available for loan:
[Call number: 621.381951 S582]
(1).
|
|
|
Management Information Systems
by Bagchi, N. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi Vikas 2010Availability: Items available for loan:
[Call number: 658.501 B14M]
(1).
|
|
|
Security, privacy and digital forensics in the cloud / edited by Lei Chen, Hassan Takabi, Nhien-An Le-Khac.
by Chen, Lei, 1978 July 28- [editor.] | Takabi, Hassan, 1982- [editor.] | Le-Khac, Nhien-An, 1972- [editor.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, NJ ; Singapore : John Wiley & Sons, Inc., 2019Copyright date: ©2019Online access: Wiley Online Library Availability: No items available
|
|
|
5G explained : security and deployment of advanced mobile communications / Jyrki T.J. Penttinen.
by Penttinen, Jyrki T. J [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, NJ, USA : John Wiley & Sons, Inc., 2019Copyright date: ©2019Other title: Five G explained.Online access: Wiley Online Library Availability: No items available
|
|
|
Cybersecurity and decision makers : data security and digital trust / Marie de Fréminville.
by Fréminville, Marie de [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: London : Hoboken, NJ : ISTE Ltd ; John Wiley & Sons, Inc., 2020Online access: Wiley Online Library Availability: No items available
|
|
|
Tribe of Hackers Security Leaders : Tribal Knowledge from the Best in Cybersecurity Leadership.
by Carey, Marcus J | Jin, Jennifer. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Newark : John Wiley & Sons, Incorporated, 2020Online access: Wiley Online Library Availability: No items available
|
|
|
Computer network security [electronic resource] / Ali Sadiqui.
by Sadiqui, Ali. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: [S.l.] : ISTE Ltd., 2020Online access: Wiley Online Library Availability: No items available
|
|
|
Cybersecurity essentials / Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short.
by Brooks, Charles J [author.] | Grow, Christopher [author.] | Craig, Philip [author.] | Short, Donald [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, NJ : Sybex, 2017Online access: Wiley Online Library Availability: No items available
|
|
|
An introduction to cyber modeling and simulation / Jerry M. Couretas.
by Couretas, Jerry M, 1966- [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, NJ : Wiley, 2019Online access: Wiley Online Library Availability: No items available
|