Results
|
1.
|
Image from Google Jackets
|
|
|
2.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
Cyber Attacks: Protecting national infrastructure Amoroso Edward G by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Amsterdam Butterworth- Heinemann 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) Q3.
|
|
3.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|
|
4.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|
|
5.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
Wireless security Osterhage Wolfgang by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton CRC 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):7:(894) Q2 TD.
|
|
6.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|
|
7.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|
|
8.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|
|
9.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
Wireless mobile internet security Rhee Man Young by
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New Jersey WIley 2013
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,48M:71:(894) Q3;1.
|
|
10.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|
|
11.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
Multimedia communication security:recent advances by Lian Shiguo Ed. by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York Nova Science Publishers Inc 2008
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P8 TB.
|
|
12.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|
|
13.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|
|
14.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|
|
15.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|
|
16.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|
|
17.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|
|
18.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|
|
19.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|
|
20.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|
|
21.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|
|
22.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
Practical internet security by Vacca John R by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: New York Springer 2007
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71:(894) P7 TD.
|
|
23.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|
|
24.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|
|
25.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
Adaptive security management architecture by Tiller James S by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton CRC Pres 2011
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):71:(894) Q1 TD.
|
|
26.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
Windows forensic analysis DVD tool kit by Carvey Harlan by
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Burlington Syngress Publishing Inc. 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B)91W:(894) P9 TD.
|
|
27.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
Mobile communication systems and security by Rhee Man Young by
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Chichester John Wiley 2009
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,48M:(894) P9 TD.
|
|
28.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|
|
29.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
Information security risk analysis Peltier Thomas R by
Edition: 2
Material type: Text; Format:
print
regular print
; Literary form:
Not fiction
Language: English
Publication details: Boca Raton CRC Press 2005
Availability: Items available for loan: Central Science Library (1)Collection, call number: D65,8(B):(894) P5 TD.
|
|
30.
|
Image from Amazon.com
Image from Google Jackets
Image from Baker & Taylor
|
|