Welcome
user_choices_background_image
Welcome
login container bottom
Search Libraries Catalogue
Duplicate Items
Add to My List

Print
Sorts and Limits

Results 1 - 19 of 19
1. Title: Real 802.11 security : wi fi protected access and 802.11i / Jon Edney، William a Arbaugh.
Author: Edney, Jon.
Publication: Pearson education , inc, Delhi : 2004.
Edition: 1st ed.
2. Title: Information security : principles and practices / Mark S. Merkow , Jim Breithaupt.
Author: MERKOW , Mark S
Publication: Pearson Education, Upper Saddle River: 2006.
3. Title: Basics of networke security , firewalls , and vpns.
Publication: Prentice hall, New delhi : 2003.
Edition: 1st ed.
4. Title: Data protection and information lifecycle management / Tom Petrocelli.
Author: PETROCELLI , Tom
Publication: Prentice Hall, Upper Saddle River: 2006.
5. Title: Unix system security : a guide for users and system administrators. / David A. Curry.
Addison-Wesley professional computing series.
Author: Curry , David A.
Publication: Addison-Wesley Pub, California: 1992.
6. Title: MCSE Training KIt : Microsoft internet security and Acceleration server 2000/ Microsoft Corporation.
Publication: Microsoft، [د.م.]: 2001.
7. Title: Software Security : Theory, Programming, and Practice / Richard Sinn.
Author: Sinn, Richard.
Publication: Course technology, Australia : 2008.
Edition: India ed.
8. Title: Recognizing patterns in transmitted signals for identification purposes by Baha' A. Alsaify.
Author: Alsaify, Baha' A., 1984-
Publication: University of Arkansas, Arkansas : 2012.
9. Title: Network security for dummies/ by Chey Cobb.
Author: Cobb , Chey
Publication: Wiley, [S.l.]: 2003.
10. Title: Security in computing/ Charles P. Pfleeger , Shari Lawrence Pfleeger.
Author: Pfleeger , Charles P.
Publication: Prentice Hall, [S.l.]: 2003.
Edition: 3rd.ed.
 
 
Results 1 - 19 of 19
Duplicate Items
Add to My List

Print
Sorts and Limits