Example

LRC Welcomes you to the House of Knowledge

Your search returned 101 results. Subscribe to this search

Not what you expected? Check for suggestions
|
Books Information security policies and implementation issues

by National Information Infrastructure Testbed.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: India: Prentice Hall of India, 2004Availability: Items available for loan: UMT Main Campus [Call number: 005.8 NAT-I] (1).
Books Network security private communication in a public world Charlie Kaufman<>Mike Speciner<>Radia Perlman

by Charlie Kaufman | Mike Speciner | Radia Perlman.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: India: Prentice Hall of India, 2005Availability: Items available for loan: UMT Main Campus [Call number: 005.8 KAU-N] (1).
Books Introduction to cryptography with Java Applets David Bishop

by David Bishop.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: "Boston,USA:" "Jones and Bartlett Publishers," 2003Availability: Items available for loan: UMT Main Campus [Call number: 005.82 BIS-I] (1).
Books Principles of computer security [+CD]: security + and beyond Chuck Cothren<>Gregory B. White<>Wm. Arthur Conklin

by Chuck Cothren | Gregory B. White | Wm. Arthur Conklin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: "Boston,USA:" "McGraw-Hill," 2005Availability: Items available for loan: UMT Main Campus [Call number: 005.8 CON-P] (1).
Books Security in computing Charles P. Pfleeger<>Shari Lawrence Pfleeger

by Charles P. Pfleeger | Shari Lawrence Pfleeger.

Edition: 3rdMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi,India: Pearson Education, 2003Availability: Items available for loan: UMT Main Campus [Call number: 005.8 PFL-S] (2).
Books Applied cryptography Schneier, Bruce

by Schneier, Bruce.

Edition: 1stMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: New York,USA: John Wiley, 1996Availability: Items available for loan: UMT Main Campus [Call number: 005.82 SCH-A] (2). Withdrawn (1).
Books The understanding guide to computer security : Slightly aske Alexander, Michael<>Computer security

by Alexander, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: 1996Availability: Items available for loan: UMT Main Campus [Call number: 005.8 ALE-U] (1).
Books Unix system security : How to protect your data and prevent Farrow, Rik

by Farrow, Rik.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: 1991Availability: Items available for loan: UMT Main Campus [Call number: 005.43 FAR-U] (1).
Books Public-key cryptography Arto Salomaa

by Arto Salomaa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London,UK: Springer, 1990Availability: Items available for loan: UMT Main Campus [Call number: 005.82 SAL-P] (1).
Books PC data recovery and disaster prevention S. Harris<>S. Nugus

by S. Harris | S. Nugus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Manchester,USA: NCC Blackwell, 1992Availability: Items available for loan: UMT Main Campus [Call number: 005.8 HAR-P] (1).
Books Wirelss security models, threats, and solutions Panos C. Lekkas<>Randall K. Nichols

by Panos C. Lekkas | Randall K. Nichols.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York,USA: McGraw-Hill, 2002Availability: Items available for loan: UMT Main Campus [Call number: 005.8 NIC-W] (1).
Books Real 802.11 security wi-fi protected access and 802.11i Jon Edney<>William A. Arbaugh

by Jon Edney | William A. Arbaugh.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi,India: Pearson Education, 2004Availability: Items available for loan: UMT Main Campus [Call number: 005.8 EDN-R] (1).
Books Mission critical! internet security

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress, 2001Availability: Items available for loan: UMT Main Campus [Call number: 005.8 MIS-] (1).
Books Solaris security Peter H. Gregory

by Peter H. Gregory.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi,India: Pearson, 2000Availability: Items available for loan: UMT Main Campus [Call number: 005.8 GRE-S] (1).
Books Safe and secure secure yourm home network and protect your pricvacy online

by Ali Mehrassa | Arman Danesh | Felix Lau.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis,Indiana: SAMS, 2002Availability: Items available for loan: UMT Main Campus [Call number: 005.8 DAN-S] (1).
Books Introduction to computer security

by Matt Bishop | Sathyanarayana S. Venkatramanayya.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi,India: Pearson Education, 2005Availability: Items available for loan: UMT Main Campus [Call number: 005.8 BIS-I] (1).
Books Security for mobility Chris J. Mitchell

by Chris J. Mitchell.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London,UK: The Institute of Electrical Enginners, 2004Availability: Items available for loan: UMT Main Campus [Call number: 005.8 SEC-] (1).
Books New economy equity navigating secrurity and legal issues in digital business Bond, Robert

by Bond, Robert.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester,UK: John Wiley, 2002Availability: Items available for loan: UMT Main Campus [Call number: 658.80285 BON-N] (2).
Books CCS 2006 : proceedings of the 13th ACM conference on computer and communication Association for Computer Machinery

by Association for Computer Machinery.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York,USA: ACM Press, 2006Availability: Items available for loan: UMT Main Campus [Call number: 005.8 ASS-C] (1).
Books Security planning & disaster recovery Maiwald, Eric<>Sieglein, William

by Maiwald, Eric | Sieglein, William.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York,USA: McGraw-Hill, 2002Availability: Items available for loan: UMT Main Campus [Call number: 005.8 MAI-S] (1).
Books CISA [certified information systems auditor] review manual 2011

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Illinois,USA: ISACA, 2011Availability: Items available for loan: UMT Main Campus [Call number: 378.1664 CER-] (1).
Books Elements of computer security Salomon, David

by Salomon, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi,India: Springer, 2010Availability: Items available for loan: UMT Main Campus [Call number: 005.8 SAL-E] (1).
Books The revolution will be digitished dispactches from the information war Brooke, Heather

by Brooke, Heather.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London,UK: Windmill Books, 2011Availability: Items available for loan: UMT Main Campus [Call number: 303.4833 BRO-R] (1).
Books Computer security principles and practice Stallings, William<>Brown, Lawrie

by Stallings, William | Brown, Lawrie.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi,India: Pearson, 2010Availability: No items available Checked out (1).
Theses and Term Papers Multi channel video security system [MCS programme] Abida Pervin<>Quasira Ramzan

by Abida Pervin | Quasira Ramzan.

Material type: serial Continuing resource; Format: print Publisher: Lahore,Pakistan: University of Management and Technology, 2003Availability: Items available for reference: UMT Main Campus [Call number: TP 005.8 QUA-M] (1).
Theses and Term Papers Certificate authority with secure network communication with RSA encryption algorithm & digital signature [MCS programme] Usman Javaid

by Usman Javaid.

Material type: serial Continuing resource; Format: print Publisher: Lahore,Pakistan: University of Management and Technology, 2004Availability: Items available for reference: UMT Main Campus [Call number: TP 005.8 USM-C] (1).
Theses and Term Papers Designing virtual private network using concentratores, DES, 3DES, VPN client (VPN specialist) [BCS programme] Adnan Khalid, Muhammad<>Mehmood Akhtar

by Adnan Khalid, Muhammad | Mehmood Akhtar.

Material type: serial Continuing resource; Format: print Publisher: Lahore,Pakistan: University of Management and Technology, 2005Availability: No items available Withdrawn (1).
© Copyright LRC, UMT 2021. All rights reserved.           Credit: Muhammad Ismail