Example

LRC Welcomes you to the House of Knowledge

Your search returned 102 results.

Not what you expected? Check for suggestions
Sort
Results
Books
Information security policies and implementation issues by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: India: Prentice Hall of India, 2004
Availability: Items available for loan: UMT Main Campus (1)Call number: 005.8 NAT-I.
Books
Network security private communication in a public world Charlie Kaufman<>Mike Speciner<>Radia Perlman by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: India: Prentice Hall of India, 2005
Availability: Items available for loan: UMT Main Campus (1)Call number: 005.8 KAU-N.
Books
Introduction to cryptography with Java Applets David Bishop by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: "Boston,USA:" "Jones and Bartlett Publishers," 2003
Availability: Items available for loan: UMT Main Campus (1)Call number: 005.82 BIS-I.
Books
Principles of computer security [+CD]: security + and beyond Chuck Cothren<>Gregory B. White<>Wm. Arthur Conklin by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: "Boston,USA:" "McGraw-Hill," 2005
Availability: Items available for loan: UMT Main Campus (1)Call number: 005.8 CON-P.
Transferred to Sialkot Campus
Computer security: art and science Matt Bishop by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: "Delhi,India:" "Pearson Education," 2003
Availability: Items available for reference: UMT Main Campus: Not for loan (1)Call number: 005.8 BIS-C.
Books
Security in computing Charles P. Pfleeger<>Shari Lawrence Pfleeger by
Edition: 3rd
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Delhi,India: Pearson Education, 2003
Availability: Items available for loan: UMT Main Campus (2)Call number: 005.8 PFL-S, ...
Books
Applied cryptography Schneier, Bruce by
Edition: 1st
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York,USA: John Wiley, 1996
Availability: Items available for loan: UMT Main Campus (2)Call number: 005.82 SCH-A, ... Not available: UMT Main Campus: Withdrawn (1).
Books
The understanding guide to computer security : Slightly aske Alexander, Michael<>Computer security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: 1996
Availability: Items available for loan: UMT Main Campus (1)Call number: 005.8 ALE-U.
Books
Unix system security : How to protect your data and prevent Farrow, Rik by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: 1991
Availability: Items available for loan: UMT Main Campus (1)Call number: 005.43 FAR-U.
Permanently weeded out collection
Applied cryptography: protocoles, algorithms, and source code in C. Bruce Schneier by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York,USA: John Wiley & Sons, 1994
Availability: Items available for reference: UMT Main Campus: Not for loan (1)Call number: 005.82 SCH-A.
Books
Public-key cryptography Arto Salomaa by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London,UK: Springer, 1990
Availability: Items available for loan: UMT Main Campus (1)Call number: 005.82 SAL-P.
Books
PC data recovery and disaster prevention S. Harris<>S. Nugus by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Manchester,USA: NCC Blackwell, 1992
Availability: Items available for loan: UMT Main Campus (1)Call number: 005.8 HAR-P.
Books
Wirelss security models, threats, and solutions Panos C. Lekkas<>Randall K. Nichols by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York,USA: McGraw-Hill, 2002
Availability: Items available for loan: UMT Main Campus (1)Call number: 005.8 NIC-W.
Books
Real 802.11 security wi-fi protected access and 802.11i Jon Edney<>William A. Arbaugh by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Delhi,India: Pearson Education, 2004
Availability: Items available for loan: UMT Main Campus (1)Call number: 005.8 EDN-R.
Books
Mission critical! internet security
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Rockland: Syngress, 2001
Availability: Items available for loan: UMT Main Campus (1)Call number: 005.8 MIS-.
Books
Solaris security Peter H. Gregory by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Delhi,India: Pearson, 2000
Availability: Items available for loan: UMT Main Campus (1)Call number: 005.8 GRE-S.
Books
Safe and secure : secure your home network and protect your privacy online / by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis,Indiana: SAMS, 2002
Availability: Items available for loan: UMT Main Campus (1)Call number: 005.8 DAN-S.
Transferred to Sialkot Campus
Applied cryptography, 2nd by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York,USA: John Wiley & Sons, 2001
Availability: Items available for reference: UMT Main Campus: Not for loan (1)Call number: 005.82 SCH-A.
Books
Introduction to computer security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Delhi,India: Pearson Education, 2005
Availability: Items available for loan: UMT Main Campus (1)Call number: 005.8 BIS-I.
Books
Security for mobility Chris J. Mitchell by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London,UK: The Institute of Electrical Enginners, 2004
Availability: Items available for loan: UMT Main Campus (1)Call number: 005.8 SEC-.
Books
New economy equity navigating secrurity and legal issues in digital business Bond, Robert by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chichester,UK: John Wiley, 2002
Availability: Items available for loan: UMT Main Campus (2)Call number: 658.80285 BON-N, ...
Books
CCS 2006 : proceedings of the 13th ACM conference on computer and communication Association for Computer Machinery by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York,USA: ACM Press, 2006
Availability: Items available for loan: UMT Main Campus (1)Call number: 005.8 ASS-C.
Books
Security planning & disaster recovery Maiwald, Eric<>Sieglein, William by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York,USA: McGraw-Hill, 2002
Availability: Items available for loan: UMT Main Campus (1)Call number: 005.8 MAI-S.
Books
CISA [certified information systems auditor] review manual 2011
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Illinois,USA: ISACA, 2011
Availability: Items available for loan: UMT Main Campus (1)Call number: 378.1664 CER-.
Books
Elements of computer security Salomon, David by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi,India: Springer, 2010
Availability: Items available for loan: UMT Main Campus (1)Call number: 005.8 SAL-E.
Books
The revolution will be digitished dispactches from the information war Brooke, Heather by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London,UK: Windmill Books, 2011
Availability: Items available for loan: UMT Main Campus (1)Call number: 303.4833 BRO-R.
Books
Computer security principles and practice Stallings, William<>Brown, Lawrie by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi,India: Pearson, 2010
Availability: Not available: UMT Main Campus: Checked out (1).
Theses and Term Papers
Multi channel video security system [MCS programme] Abida Pervin<>Quasira Ramzan by
Material type: Continuing resource Continuing resource; Format: print
Publication details: Lahore,Pakistan: University of Management and Technology, 2003
Availability: Items available for reference: UMT Main Campus: Not for loan (1)Call number: TP 005.8 QUA-M.
Theses and Term Papers
Certificate authority with secure network communication with RSA encryption algorithm & digital signature [MCS programme] Usman Javaid by
Material type: Continuing resource Continuing resource; Format: print
Publication details: Lahore,Pakistan: University of Management and Technology, 2004
Availability: Items available for reference: UMT Main Campus: Not for loan (1)Call number: TP 005.8 USM-C.
Theses and Term Papers
Designing virtual private network using concentratores, DES, 3DES, VPN client (VPN specialist) [BCS programme] Adnan Khalid, Muhammad<>Mehmood Akhtar by
Material type: Continuing resource Continuing resource; Format: print
Publication details: Lahore,Pakistan: University of Management and Technology, 2005
Availability: Not available: UMT Main Campus: Withdrawn (1).
Pages
© Copyright LRC, UMT 2021. All rights reserved.           Credit: Muhammad Ismail