|
1.
|
Network Security: A Begginers Guide
by Maiwald, E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London ; Mccgraw Hill ; 2001Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.59 .M35 2001] (1).
|
|
2.
|
Crytography and Network Security :principles and practice/ Stallings William
by Stalling, William. Edition: 2ndMaterial type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey ; Prentice Hall ; 1999Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5102.94 .S73 2017] (2).
|
|
3.
|
Guide to Computer Forensics and Investigations
by Bill Nelson. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia ; Thomson ; 2004Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: HV8079.C65G85 2004] (5).
|
|
4.
|
Computer security and cryptography / Alan G.Konheim
by Konheim, A. G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Wiley-interscience, 2007Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9.A25K63 2007 C.1] (3).
|
|
5.
|
International handbook of computer security
by Shim, Jae K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London Global Professional Pub 2008Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA 76.9 .A25S468 2008] (1).
|
|
6.
|
Introduction to network security/ Theory and practice Jie Wang, Zachary A. Kissel
by Wang, Jie. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: India Wiley 2015Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.59 .W356] (1).
|
|
7.
|
Cybersecurity and cyberwar : what everyone needs to know / P.W. Singer
by Singer P.W | Allan Friedman. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: USA: Oxford University 2014Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9.S56 2014] (1).
|
|
8.
|
Computer forensics : computer crime scene investigation / John R. Vacca
by Vacca, J.R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Firewall Media, 2004Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9.A25V33 2004] (1).
|
|
9.
|
Security in computing/ Charles P. Pfleeger and Shri Lawrence Pfleeger
by Pfleeger Charles P | Pfleeger Shari Lawrence | Shah Deven. Edition: 4th.ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London Pearson 2009Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .P45 C.1] (3).
|
|
10.
|
Bayesian methods for hackers : probalistic programming and bayesian inference / Cameron Davidson-Pilon
by Davidson-Pilon, C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Addison Wesley, 2015Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9.A25 D38 2015 C.1] (3).
|
|
11.
|
Computer and intrusion forensic: George Mohay; Alison Anderson; Byron Collie; Rodney McKemmish
by Mohay, G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2003Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .A25 C628 2003] (2).
|
|
12.
|
Security technology convergence insights/ Ray Bernard
by Bernard, R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Armsterdam: Elsevier, 2015Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .B46 2015] (10).
|
|
13.
|
Computer forensics and cyber crime: Britz, M.T. An introduction
by Britz, M.T. Edition: 2nd.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chennai: Pearson, 2012Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .A25 B77 2012 C.1] (3).
|
|
14.
|
SCADA Security : what's broken and how to fix it / Andrew Ginter
by Ginter, A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Calgary: Abterra Technologies Inc, 2016Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TS156.8.G568 2016 C.1 ] (3).
|
|
15.
|
Information security management principles Taylor, A., .Alexander, D., Finch, A., Sutton, D.
by Taylor, A. Edition: 2nd.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Swindon: BCS Learning & Development, 2013Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .A25 T375 2013 C.1] (3).
|
|
16.
|
The web application hacker's handbook: finding and exploiting security flaws/ Dafydd Stuttard
by Studdard, D. Edition: 2nd.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: John Wiley, 2011Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.875 .I57 S852 2011 C.1] (3).
|
|
17.
|
Data and computer communications / Williams, S.
by Stallings, W. Edition: 10th.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Pearson, 2014Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.S73 2014 C.1] (3).
|
|
18.
|
Computer And Intrusion Forensics/ George Mohay Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Norwood : Artech House, 2006Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .A25C628 2003 C.1] (1).
|