Example

LRC Welcomes you to the House of Knowledge

Your search returned 15 results. Subscribe to this search

Not what you expected? Check for suggestions
|
Books Network security Shaffer, Steven L.<>Simon, Alan R.

by Shaffer, Steven L | Simon, Alan R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: USA: AP Professional, 1994Availability: Items available for loan: LRC University of Management and Technology Lahore. [Call number: 005.8 SHA-N] (1).
Books Security transformation digital defence strategies to protect your company's reputation and karket Mary Pat McCarthy<>Stuart Campbell

by Mary Pat McCarthy | Stuart Campbell.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York,USA: McGraw-Hill, 2001Availability: Items available for loan: LRC University of Management and Technology Lahore. [Call number: 658.05 MCC-S] (1).
Books Protecting critical infrastrcutures against cyber-attack Goodman, Seymour E.<>Longhurst, David W.<>Lukasik, Stephen J.

by Goodman, Seymour E | Longhurst, David W | Lukasik, Stephen J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London,UK: The International Institute for Strategic Studies, 2003Availability: Items available for loan: LRC University of Management and Technology Lahore. [Call number: W 005.8 LUK-P] (1).
Books Biometrics for network security Reid, Paul

by Reid, Paul.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi,India: Pearson Education, 2004Availability: Items available for loan: LRC University of Management and Technology Lahore. [Call number: 005.8 REI-B] (1).
Books Wireless network security Du, Ding-Zhu<>Shen, Xuemin<>Xiao, Yang

by Du, Ding-Zhu | Shen, Xuemin | Xiao, Yang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi,India: Springer, 2007Availability: Items available for loan: LRC University of Management and Technology Lahore. [Call number: 005.8 XIA-W] (1).
Books Network security essentials applications and standards Stallings, William

by Stallings, William.

Edition: 3rdMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi,India: Pearson Education, 2008Availability: Items available for loan: LRC University of Management and Technology Lahore. [Call number: 005.8 STA-N] (1).
Books Network security essentials applications and standards Stallings, William

by Stallings, William.

Edition: 4thMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi,India: Pearson, 2011Availability: Items available for loan: LRC University of Management and Technology Lahore. [Call number: 005.8 STA-N] (1).
Books Network Security First-Step Thomas, Tom<>Stoddard, Donald

by Thomas, Tom | Stoddard, Donald.

Edition: 2ndMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis,USA: Cisco Press, 2012Availability: Items available for loan: LRC University of Management and Technology Lahore. [Call number: 005.8 THO-N] (1).
Books Network security architectures Convery, Sean

by Convery, Sean.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi,India: Pearson, 2012Availability: Items available for loan: LRC University of Management and Technology Lahore. [Call number: 005.8 CON-N] (1).
Theses and Term Papers Intrusion detection system [MCS programme] Jawad Rahim<>Qasim, Muhammad<>Umer Zia

by Jawad Rahim | Qasim, Muhammad | Umer Zia.

Material type: serial Continuing resource; Format: print Publisher: Lahore,Pakistan: University of Management and Technology, 2004Availability: Items available for reference: LRC University of Management and Technology Lahore. [Call number: TP 005.8 JAW-I] (1).
Theses and Term Papers Designing virtual private network using VPN concentrators, DES, 3DES, VPN client (VPN specialist) [BCS programme] Adnan Khalid, Muhammad<>Mehmood Akhtar

by Adnan Khalid, Muhammad | Mehmood Akhtar.

Material type: serial Continuing resource; Format: print Publisher: Lahore,Pakistan: University of Management and Technology, 2005Availability: Items available for reference: LRC University of Management and Technology Lahore. [Call number: TP 005.8 MEH-D] (1).
Theses and Term Papers Design and implementation of network security using Linux [MCS programme] Faisal Shafiq<>Waseem Hussain, Muhammad

by Faisal Shafiq | Waseem Hussain, Muhammad.

Material type: serial Continuing resource; Format: print Publisher: Lahore,Pakistan: University of Management and Technology, 2004Availability: Items available for reference: LRC University of Management and Technology Lahore. [Call number: TP 005.8 WAS-D] (1).
Books Wireless network security a beginner's guide Wrightson, Tyler

by Wrightson, Tyler.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York,USA: McGraw-Hill, 2012Availability: Items available for loan: LRC University of Management and Technology Lahore. [Call number: 005.8 WRI-W] (1).
Books Guide to network security Whitman, Michael E.|[et al, ]

by Whitman, Michael E | [et al, ].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi,India: Cengage Learning India, 2013Availability: No items available Checked out (1).
Books Network security / the complete reference Bragg, Roberta|Phodes-Ousley, Mark|Strassberg, Keith

by Bragg, Roberta | Phodes-Ousley, Mark | Strassberg, Keith.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: McGraw-Hill, 2004Availability: Items available for loan: LRC University of Management and Technology Lahore. [Call number: 005.8 BRA-N] (1).
© Copyright LRC, UMT 2018. All rights reserved.           Credit: Muhammad Ismail