|
|
1.
|
Computer security fundamentals / Chuck Easttom.
by Easttom, Chuck. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River, N.J. : Pearson Prentice Hall, c2006Availability: Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/EAC] (1).
|
|
|
2.
|
Firewalls and Internet security : repelling the wily hacker / William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin.
by Cheswick, William R | Bellovin, Steven M | Rubin, Aviel D. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston : Addison-Wesley, c2003Availability: Items available for loan: CUET CENTRAL LIBRARY [Call number: 005.8/CHF] (3). Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/CHF] (1).
|
|
|
3.
|
Digital watermarking and steganography / Ingemar J. Cox ... [et al.].
by Cox, Ingemar J | Cox, I. J. (Ingemar J.) | Miller, Matthew L | Bloom, Jeffrey A | Fridrich, Jessica | Kalker, Ton. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam ; Boston : Morgan Kaufmann Publishers, c2011Online access: Table of contents only | Publisher description Availability: Items available for loan: CUET CENTRAL LIBRARY [Call number: 005.8/COD] (5). Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/COD] (1).
|
|
|
4.
|
Digital watermarking / Ingemar J. Cox, Matthew L. Miller and Jeffrey A. Bloom.
by Cox, Ingemar J. (Ingemar J.) | Miller, Matthew L | Bloom, Jeffrey A. (Jeffrey Adam), 1964-. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Diego : Morgan Kaufmann publishers, c2002Online access: Publisher description | Table of contents Availability: Items available for loan: CUET CENTRAL LIBRARY [Call number: 005.8/COD] (1). Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/COD] (1).
|
|
|
5.
|
Security in computing / Charles P. Pfleeger.
by Pfleeger, Charles P, 1948-. Edition: 2nd ed. International ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River, NJ : Prentice Hall PTR, c1997Availability: Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/PFS] (1). Checked out (1). Damaged (1).
|
|
|
6.
|
Security in computing / Charles P. Pfleeger and Shari Lawrence Pfleeger.
by Pfleeger, Charles P, 1948-. Edition: 3rd ed. Eastern economy ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi : Prentice-Hall of India private limited, c2003Availability: Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/PFS] (1).
|
|
|
7.
|
Security in computing / Charles P. Pfleeger and Shari Lawrence Pfleeger.
by Pfleeger, Charles P, 1948-. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi : Dorling Kindersley (India) private limited, c2009Availability: Items available for loan: CUET CENTRAL LIBRARY [Call number: 005.8/PFS] (1). Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/PFS] (1).
|
|
|
8.
|
Fundamentals of computer security / Josef Pieprzyk.Thomas Hardjono and Jennifer Seberry
by Pieprzyk, Josef, 1949- | Hardjono, Thomas | Seberry, Jennifer. Edition: Springer International ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi : Springer (India) private limited, c2003Online access: Publisher description | Table of contents only Availability: Items available for loan: CUET CENTRAL LIBRARY [Call number: 005.8/PIF] (6). Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/PIF] (1).
|
|
|
9.
|
Biometrics for network security / Paul Reid.
by Reid, Paul. Edition: Low price ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi : Pearson education (Singapore) Pte. Ltd., c2004Other title: Network security.Availability: Items available for loan: CUET CENTRAL LIBRARY [Call number: 005.8/REB] (4). Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/REB] (1).
|
|
|
10.
|
Security patterns : integrating security and systems engineering / Markus Schumacher ... [et al.].
by Schumacher, Markus | Schumacher, Markus. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester, England ; Hoboken, NJ : John Wiley & Sons, c2006Online access: Table of contents only | Publisher description | Contributor biographical information Availability: Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/SCS] (1).
|
|
|
11.
|
Wireless security : models, threats, and solutions / Randall K. Nichols and Panos C. Lekkas.
by Nichols, Randall K | Lekkas, Panos C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi : Tata McGraw-Hill, c2002Online access: Contributor biographical information | Table of contents Availability: Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/NIW] (1).
|
|
|
12.
|
Privacy-aware knowledge discovery: novel applications and new techniques / edited by Francesco Bonchi and Elena Ferrari
by Bonchi, Francesco [editor] | Ferrari, Elena [editor]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: CRC Press, c2011Availability: Items available for loan: CUET CENTRAL LIBRARY [Call number: 006.312/BOP] (2). Items available for reference: CUET CENTRAL LIBRARY [Call number: 006.312/BOP] (1).
|
|
|
13.
|
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger and Jonathan Margulies.
by Pfleeger, Charles P | Pfleeger, Shari Lawrence | Margulies, Jonathan. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Noida : Pearson, c2018Availability: Items available for loan: CUET CENTRAL LIBRARY [Call number: 005.8/PFS] (2).
|
|
|
14.
|
Cybersecurity and applied mathematics / Leigh Metcalf, William Casey.
by Metcalf, Leigh (Computer security researcher) [author.] | Casey, William (William A.) [author.]. Material type: Book; Format:
print
; Literary form:
Not fiction
Copyright date: ©2016Online access: Click here to access online Availability: Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.801/LEC] (1).
|
|
|
15.
|
Digital forensics / edited by John Sammons, Assistant Professor and Director of the Digital Forensics and Information Assurance Program, Marshall University, Huntington, WV, USA.
by Sammons, John [editor.]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham, MA : Elsevier, c2015Copyright date: ©2016Online access: Click here to access online Availability: Items available for reference: CUET CENTRAL LIBRARY [Call number: 363.256/JOI] (1).
|
|
|
16.
|
Introduction to information security : a strategic-based approach / Timothy J. Shimeall, Jonathan M. Spring.
by Shimeall, Timothy [author.] | Spring, Jonathan M [author.]. Edition: First edition.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam ; Boston : Elsevier, c2014Online access: Click here to access online Availability: Items available for reference: CUET CENTRAL LIBRARY [Call number: 005.8/SHI] (1).
|
|
|
17.
|
Security in IoT social networks / edited by Fadi Al-Turjman, B.D. Deebak.
by Al-Turjman, Fadi [editor.] | Deebak, B. D [editor.]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London : Elsevier [2021]Copyright date: ©2021Online access: Click here to access online Availability: Items available for loan: CUET CENTRAL LIBRARY [Call number: 006.312/TUS] (1).
|