Your search returned 37 results. Subscribe to this search

|
21. Hands-on ethical hacking and network defense /

by Simpson, Michael T | Co.

Edition: . [SMaterial type: book Book Publisher: 48 Cengage Learning, 2000Online access: Click here to access online Availability: Items available for loan: Seminar Library, Information Technology [Call number: 005.8SIM] (1).

22. Cryptography and Network Security /

by Forouzan, Behrouz A.

Material type: book Book Publisher: [S.l.] : Tata McGraw-Hill, 2016Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.678FOR] (4), Seminar Library, Information Technology [Call number: 004.678FOR] (1).

23. Network Security and Management

by Singh, Brijendra.

Edition: 3rd ed.Material type: computer file Computer file; Format: electronic Publisher: New Delhi PHI Learning Private Limited, 2012Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 005.8SIN (Shelf - 13C)] (1), Seminar Library, Information Technology [Call number: 005.8SIN] (1).

24. Cryptography and Network Security: principles and practices

by Stallings, William | Tahiliani, Mohit P.

Edition: 4th ed.Material type: book Book Publisher: [S.l.] : Prentice Hall, 2005Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.678STA] (34), Reference Section [Call number: 004.678STA] (2). Checked out (2).

25. Network Security : private communication in a public world

by Kaufman, Charlie | Perlman, Radia | Speciner, Mike.

Edition: 2nd ed.Material type: book Book Publisher: [S.l.] : Prentice Hall, 2002Online access: Click here to access online Availability: Items available for loan: Computerization and Networking Section [Call number: 005.8KAU] (1).

26. Inside Network Security Assessment :

by Gregg, Michael | Kim, David.

Material type: book Book Publisher: [S.l.] : Sams Publishing, 2005Online access: Click here to access online Availability: Items available for loan: Computerization and Networking Section [Call number: 004.678GRE] (1).

27. Internet security :

by Speed, Tim | Ellis, Juanita.

Edition: 1st ed.Material type: book Book Publisher: [S.l.] : Digital Press, 2003Online access: Click here to access online Availability: Items available for loan: Computerization and Networking Section [Call number: 004.678SPE] (1).

28. Security in Computing /

by Pfleeger.

Edition: 4th ed.Material type: book Book Publisher: New Delhi Pearson 2013Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8PFL] (2), Library for Girls [Call number: 005.8PFL] (1).

29. Computer Forensics and Cyber Crime :

by Britz, Marjie T | Britz, Marjie.

Edition: 2nd ed.Material type: book Book Publisher: [S.l.] : Prentice Hall, 2008Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8BRI] (2).

30. Information Security: the complete reference

by Ousley, Mark Rhodes.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi McGraw Hill 2013Online access: eBook Availability: Items available for loan: Seminar Library, Information Technology [Call number: 005.8OUS] (1).

31. Security in Computing

by Pfeeger C P | Margulies, Jonathan - Pfleeger, Shari Lawrence.

Material type: book Book Publisher: New Delhi Pearson Education 2013Availability: Items available for loan: Seminar Library, Information Technology [Call number: 005.8PFI] (1).

32. Analyzing Computer Security :

by Pfleeger, Charles P.

Edition: 1st ed.Material type: book Book Publisher: [S.l.] : Prentice Hall, 2011Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8PFL] (1), Library for Girls [Call number: 005.8PFL] (1).

33. Building Secure Software /

by Mcgraw, [ MEI ] John Viega Gary | Viega, John.

Material type: book Book Publisher: [S.l.] : Machinery Industry Press, 2013Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.1221VIE] (1).

34. Computer Security Penetration Testing

by Basta, A.

Material type: book Book Publisher: Japan: Cengage Learning, 2008Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8BAS] (2).

35. Cryptography and Network Security /

by Forouzan, Behrouz A.

Edition: 3rd ed.Material type: book Book Publisher: [S.l.] : Tata McGraw-Hill, 2015Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 006.6FOR] (5), Library for Girls [Call number: 004.6FOR] (1).

36. Cryptography and Network Security : Principles and Practices

by Stallings, Willam | Tahiliani, Mohit P.

Edition: 6th ed.Material type: book Book Publisher: New Delhi : Pearson, 2015Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8STA] (7), Library for Girls [Call number: 005.8STA] (1).

37. Computer Security Fundamentals /

by Easttom,Chuck.

Edition: 2nd ed.Material type: book Book Publisher: New Delhi: Pearson, 2015Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 005.8EAS (Shelf - 13C)] (3).


Copyright © 2018,The QUEST, Nawabshah, Shaheed Benazirabad. All rights reserved
Mr. G. Farooq Channar (Librarian) QUEST, Nawabshah, Sindh, Pakistan 67480.
 Ph#: |   0244-9370381-4 Ext. 2308   Email| [email protected]   Web|  http://www.quest.edu.pk