CUET Library - Header

Your search returned 17 results. Subscribe to this search

|
1. Computer security fundamentals / Chuck Easttom.

by Easttom, Chuck.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, N.J. : Pearson Prentice Hall, c2006Availability: Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/EAC] (1).

2. Firewalls and Internet security : repelling the wily hacker / William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin.

by Cheswick, William R | Bellovin, Steven M | Rubin, Aviel D.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston : Addison-Wesley, c2003Availability: Items available for loan: CUET CENTRAL LIBRARY [Call number: 005.8/CHF] (3). Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/CHF] (1).

3. Digital watermarking and steganography / Ingemar J. Cox ... [et al.].

by Cox, Ingemar J | Cox, I. J. (Ingemar J.) | Miller, Matthew L | Bloom, Jeffrey A | Fridrich, Jessica | Kalker, Ton.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam ; Boston : Morgan Kaufmann Publishers, c2011Online access: Table of contents only | Publisher description Availability: Items available for loan: CUET CENTRAL LIBRARY [Call number: 005.8/COD] (5). Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/COD] (1).

4. Digital watermarking / Ingemar J. Cox, Matthew L. Miller and Jeffrey A. Bloom.

by Cox, Ingemar J. (Ingemar J.) | Miller, Matthew L | Bloom, Jeffrey A. (Jeffrey Adam), 1964-.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Diego : Morgan Kaufmann publishers, c2002Online access: Publisher description | Table of contents Availability: Items available for loan: CUET CENTRAL LIBRARY [Call number: 005.8/COD] (1). Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/COD] (1).

5. Security in computing / Charles P. Pfleeger.

by Pfleeger, Charles P, 1948-.

Edition: 2nd ed. International ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Prentice Hall PTR, c1997Availability: Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/PFS] (1). Checked out (1). Damaged (1).

6. Security in computing / Charles P. Pfleeger and Shari Lawrence Pfleeger.

by Pfleeger, Charles P, 1948-.

Edition: 3rd ed. Eastern economy ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi : Prentice-Hall of India private limited, c2003Availability: Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/PFS] (1).

7. Security in computing / Charles P. Pfleeger and Shari Lawrence Pfleeger.

by Pfleeger, Charles P, 1948-.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi : Dorling Kindersley (India) private limited, c2009Availability: Items available for loan: CUET CENTRAL LIBRARY [Call number: 005.8/PFS] (1). Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/PFS] (1).

8. Fundamentals of computer security / Josef Pieprzyk.Thomas Hardjono and Jennifer Seberry

by Pieprzyk, Josef, 1949- | Hardjono, Thomas | Seberry, Jennifer.

Edition: Springer International ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi : Springer (India) private limited, c2003Online access: Publisher description | Table of contents only Availability: Items available for loan: CUET CENTRAL LIBRARY [Call number: 005.8/PIF] (6). Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/PIF] (1).

9. Biometrics for network security / Paul Reid.

by Reid, Paul.

Edition: Low price ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi : Pearson education (Singapore) Pte. Ltd., c2004Other title: Network security.Availability: Items available for loan: CUET CENTRAL LIBRARY [Call number: 005.8/REB] (4). Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/REB] (1).

10. Security patterns : integrating security and systems engineering / Markus Schumacher ... [et al.].

by Schumacher, Markus | Schumacher, Markus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester, England ; Hoboken, NJ : John Wiley & Sons, c2006Online access: Table of contents only | Publisher description | Contributor biographical information Availability: Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/SCS] (1).

11. Wireless security : models, threats, and solutions / Randall K. Nichols and Panos C. Lekkas.

by Nichols, Randall K | Lekkas, Panos C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi : Tata McGraw-Hill, c2002Online access: Contributor biographical information | Table of contents Availability: Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/NIW] (1).

12. Privacy-aware knowledge discovery: novel applications and new techniques / edited by Francesco Bonchi and Elena Ferrari

by Bonchi, Francesco [editor] | Ferrari, Elena [editor].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: CRC Press, c2011Availability: Items available for loan: CUET CENTRAL LIBRARY [Call number: 006.312/BOP] (2). Items available for reference: CUET CENTRAL LIBRARY [Call number: 006.312/BOP] (1).

13. Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger and Jonathan Margulies.

by Pfleeger, Charles P | Pfleeger, Shari Lawrence | Margulies, Jonathan.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Noida : Pearson, c2018Availability: Items available for loan: CUET CENTRAL LIBRARY [Call number: 005.8/PFS] (2).

14. Cybersecurity and applied mathematics / Leigh Metcalf, William Casey.

by Metcalf, Leigh (Computer security researcher) [author.] | Casey, William (William A.) [author.].

Material type: book Book; Format: print ; Literary form: Not fiction Copyright date: ©2016Online access: Click here to access online Availability: Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.801/LEC] (1).

15. Digital forensics / edited by John Sammons, Assistant Professor and Director of the Digital Forensics and Information Assurance Program, Marshall University, Huntington, WV, USA.

by Sammons, John [editor.].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Waltham, MA : Elsevier, c2015Copyright date: ©2016Online access: Click here to access online Availability: Items available for reference: CUET CENTRAL LIBRARY [Call number: 363.256/JOI] (1).

16. Introduction to information security : a strategic-based approach / Timothy J. Shimeall, Jonathan M. Spring.

by Shimeall, Timothy [author.] | Spring, Jonathan M [author.].

Edition: First edition.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam ; Boston : Elsevier, c2014Online access: Click here to access online Availability: Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/SHI] (1).

17. Security in IoT social networks / edited by Fadi Al-Turjman, B.D. Deebak.

by Al-Turjman, Fadi [editor.] | Deebak, B. D [editor.].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London : Elsevier [2021]Copyright date: ©2021Online access: Click here to access online Availability: Items available for loan: CUET CENTRAL LIBRARY [Call number: 006.312/TUS] (1).

E-Books