Your search returned 6 results. Subscribe to this search

|
Cyber security and IT infrastructure protection / edited by John R. Vacca

by Vacca, John R [].

Edition: First edition.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Waltham, MA : Syngress, 2014Copyright date: ©2014Availability: Items available for loan: Main Library: Reference Section [Call number: QA 76.9 A25C9183 2014] (1).

Place hold Log in to add tags. Add to cart
Elementary information security / Richard E. Smith.a

by Smith, Richard E.

Edition: First edition.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Burlington, MA : Jones & Bartlett Learning, 2013Copyright date: ©2013Availability: Items available for loan: Main Library: Reference Section [Call number: QA 76.9 A25S652 2013] (1).

Information security risk assessment toolkit : practical assessments through data collections and data analysis / Mark Ryan M. Talabis, Jason L. Martin, and Evan Wheeler, Technical Editor.

by Talabis, Mark Ryan M | Martin, Jason L | Wheeler, Evan [].

Edition: First edition.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Waltham, MA : Syngress, 2013Copyright date: ©2013Availability: Items available for loan: Main Library: Reference Section [Call number: QA 76.9 A25T336 2013] (1).

Cryptography and network security / Atul Kahate.

by Kahate, Atul.

Edition: Third edition.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi: McGraw-Hill, Education [2013]Copyright date: ©2013Availability: Items available for loan: Main Library: Reference Section [Call number: TK 5105.59 K34 2013] (1).

Hacking exposed Windows : Windows security secrets and solutions / Joel Scambray, Stuart McClure.

by Scambray, Joel | McClure,Stuart.

Edition: Third edition.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York: McGraw- Hill, [2008]Copyright date: ©2008Availability: Items available for loan: Main Library: Reference Section [Call number: QA 76.9A25 S3 2008] (1).

Encyclopedia of cyber law and computer security: measures, controls, and practices / edited by Paul Moore.

by Moore, Paul [].

Material type: book Book Copyright date: Birmingham, UK : Koros Press Limited., ©2014Availability: Items available for loan: Main Library: Reference Section [Call number: QA 76.9.A25 .E53 2014 v.2] (2).

Ninoy Aquino Library and Learning Resource Center ©2016
A. Mabini Campus Anonas St., Sta. Mesa, Manila 1016
Telephone: +02 335-1762 | Email: library@pup.edu.ph

Powered by Koha