|
1.
|
Network Security: A Begginers Guide
by Maiwald, E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London ; Mccgraw Hill ; 2001Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.59 .M35 2001] (1).
|
|
2.
|
Crytography and Network Security :principles and practice/ Stallings William
by Stalling, William. Edition: 2ndMaterial type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey ; Prentice Hall ; 1999Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5102.94 .S73 2017] (2).
|
|
3.
|
Web Security for Networking and System Administrators/ David Mackey
by Mackey, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London Thompson 2004Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.59.M33 2004] (5).
|
|
4.
|
Web security :for network and system administrators David Mackey
by Mackey David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Austalia Thomson 2003Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK 5105.59. .M24 2003 C.1] (5).
|
|
5.
|
Crytography and Network Security
by Behrouz, A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi Mcgraw Hill ; 2007Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5102.59 .F672 2007] (2).
|
|
6.
|
WEB Security For Network and System Administrators
by Mackey, D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Canada ; Thomson ; 2003Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.59.M24 2003] (1).
|
|
7.
|
Voice -Enabling the Data Network : H.323, MGCP, SIP, QoS, SLAs, and Security/ James F. Durkin
by Durkin, J.F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Cisco Press, 2003Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.8865.D87 2003 C.1] (5).
|
|
8.
|
Guide to Computer Forensics and Investigations
by Bill Nelson. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia ; Thomson ; 2004Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: HV8079.C65G85 2004] (5).
|
|
9.
|
Regional Conference for the World Disarmament Campaign
by United Nations. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York ; United Nations Dept. for Disarmament Affairs ; 1986Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: JX1974.R44 1986] (3).
|
|
10.
|
Rice in the Global economy : strategic research and policy issues for food security/ edited by Sushil Pandey Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: 2010Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: HD9066.A2R528 2010] (1).
|
|
11.
|
Computer security and cryptography / Alan G.Konheim
by Konheim, A. G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Wiley-interscience, 2007Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9.A25K63 2007 C.1] (3).
|
|
12.
|
International handbook of computer security
by Shim, Jae K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London Global Professional Pub 2008Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA 76.9 .A25S468 2008] (1).
|
|
13.
|
Sector Plan for Security Building and Conflict Management
by Ministry of Interior and Co-ordination of National Government. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Kenya : Ministry of Interior and Co-ordination of National Government, 2013 Availability: Items available for reference: MULTIMEDIA UNIVERSITY LIBRARY [Call number: JX363.K48 2013] (3).
|
|
14.
|
Cryptography And Network Secuirty Principles And Practice
by Stallings, William. Edition: 6th Material type: Book Publisher: England Pearson 2014Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.59.S73] (3).
|
|
15.
|
World energy crisis : a reference handbook/ David E Newton
by Newton David E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Santa Barbara ABC-CLIO 2012Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: HD9502 .A2N498 2012] (1).
|
|
16.
|
Introduction to network security/ Theory and practice Jie Wang, Zachary A. Kissel
by Wang, Jie. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: India Wiley 2015Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.59 .W356] (1).
|
|
17.
|
Contemporary security studies/ Alan Collins
by Collins Alan. Edition: 4th.ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York Oxford University 2016Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: JZ5588 .C65 2016] (1).
|
|
18.
|
Cybersecurity and cyberwar : what everyone needs to know / P.W. Singer
by Singer P.W | Allan Friedman. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: USA: Oxford University 2014Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9.S56 2014] (1).
|
|
19.
|
Computer forensics : computer crime scene investigation / John R. Vacca
by Vacca, J.R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Firewall Media, 2004Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9.A25V33 2004] (1).
|
|
20.
|
Security in computing/ Charles P. Pfleeger and Shri Lawrence Pfleeger
by Pfleeger Charles P | Pfleeger Shari Lawrence | Shah Deven. Edition: 4th.ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London Pearson 2009Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .P45 C.1] (3).
|