Your search returned 1251 results. Subscribe to this search

|
UNIX System Security:How to Protect Your Data and Prevent Intruders

by Farrow, Rik.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts Addison-Wesley 1994Availability: Items available for loan: [Call number: 621.38195 F249U] (1).

Data and Computer Communications

by Stallings, William.

Edition: 5Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Prentice-Hall of India 2001Availability: Items available for loan: [Call number: 621.38195404 S775D] (1).

Introduction to Operating Systems

by Deitel, H.M.

Edition: 2Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Pearson Education Asia 2001Availability: No items available

Introduction to Operating Systems

by Deitel, H.M.

Edition: 2Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Pearson Education Asia 2001Availability: Items available for loan: [Call number: 621.3819642 D324I] (1).

Introduction to Operating Systems

by Deitel, H.M.

Edition: 2Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Pearson Education Asia 2001Availability: Items available for loan: [Call number: 621.3819642 D324I] (2).

Operating System Concepts

by Silberschatz, A | Galvin, Peter Baer.

Edition: 5Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York John Wiley & Sons 2000Availability: Items available for loan: [Call number: 621.381951 S582O] (1).

Civil Engineering for Disaster Risk Reduction

by Kolathayar, Sreevalsa | Pal, Indrajit | Chian,Siau Chen | Mondal,Arpita.

Publisher: Singapore Springer 2022Availability: Items available for reference: [Call number: 624 K93C] (1).

Network Security Essentials:Applications and Standards 4

by Stallings. William.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi Pearson 2012Availability: Items available for loan: [Call number: 621.38195404 S775] (1).

Computer Networks

by Peterson,Larry L | Davie,Bruce S.

Edition: 5Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Elsevier 2014Availability: Items available for loan: [Call number: 621.38195404 P973] (1).

Operating System Principles

by Silberschatz,Abraham | Galvin, Peter Bear | Gagne, Greg.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Wiley 2004Availability: Items available for loan: [Call number: 621.381951 S563] (1).

Operating System Concepts

by Silberschatz,Abraham | Galvin, Peter Baer | Gagne, Greg.

Edition: 6Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York John Wiley 2002Availability: Items available for loan: [Call number: 621.381951 S582] (1).

Management Information Systems

by Bagchi, N.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Vikas 2010Availability: Items available for loan: [Call number: 658.501 B14M] (1).

Security, privacy and digital forensics in the cloud / edited by Lei Chen, Hassan Takabi, Nhien-An Le-Khac.

by Chen, Lei, 1978 July 28- [editor.] | Takabi, Hassan, 1982- [editor.] | Le-Khac, Nhien-An, 1972- [editor.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, NJ ; Singapore : John Wiley & Sons, Inc., 2019Copyright date: ©2019Online access: Wiley Online Library Availability: No items available

5G explained : security and deployment of advanced mobile communications / Jyrki T.J. Penttinen.

by Penttinen, Jyrki T. J [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, NJ, USA : John Wiley & Sons, Inc., 2019Copyright date: ©2019Other title: Five G explained.Online access: Wiley Online Library Availability: No items available

Cybersecurity and decision makers : data security and digital trust / Marie de Fréminville.

by Fréminville, Marie de [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: London : Hoboken, NJ : ISTE Ltd ; John Wiley & Sons, Inc., 2020Online access: Wiley Online Library Availability: No items available

Tribe of Hackers Security Leaders : Tribal Knowledge from the Best in Cybersecurity Leadership.

by Carey, Marcus J | Jin, Jennifer.

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Newark : John Wiley & Sons, Incorporated, 2020Online access: Wiley Online Library Availability: No items available

Computer network security [electronic resource] / Ali Sadiqui.

by Sadiqui, Ali.

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: [S.l.] : ISTE Ltd., 2020Online access: Wiley Online Library Availability: No items available

Cybersecurity essentials / Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short.

by Brooks, Charles J [author.] | Grow, Christopher [author.] | Craig, Philip [author.] | Short, Donald [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, NJ : Sybex, 2017Online access: Wiley Online Library Availability: No items available

An introduction to cyber modeling and simulation / Jerry M. Couretas.

by Couretas, Jerry M, 1966- [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, NJ : Wiley, 2019Online access: Wiley Online Library Availability: No items available

Insider threats / Pierre-Emmanuel Arduin.

by Arduin, Pierre-Emmanuel [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: London : Hoboken, NJ : ISTE Ltd. ; John Wiley & Sons, Inc., 2018Online access: Wiley Online Library Availability: No items available