Your search returned 59 results. Subscribe to this search

|
21. Hacking Exposed : Network Security Secrets & Solutions

by McClure, Stuart.

Material type: book Book Publisher: New York Computing Mcgraw-Hill, 2001Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 004.678MCC (Shelf - 13C)] (1).

22. Construction Site Security /

by Arata, Michael.

Edition: 1st ed.Material type: book Book Publisher: [S.l.] : McGraw-Hill Professional, 2005Online access: Click here to access online Availability: Items available for loan: Seminar Library, Civil Engg. [Call number: 690.068ARA] (1).

23. Guide to network defense and countermeasures /

by Holden, Greg.

Edition: 1st ed.Material type: book Book Publisher: [S.l.] : Course Technology, 2003Online access: Click here to access online Availability: Items available for loan: Seminar Library, Information Technology [Call number: 005.8HOL] (1).

24. Hands-on ethical hacking and network defense /

by Simpson, Michael T | Co.

Edition: . [SMaterial type: book Book Publisher: 48 Cengage Learning, 2000Online access: Click here to access online Availability: Items available for loan: Seminar Library, Information Technology [Call number: 005.8SIM] (1).

25. Principles of information security /

by Whitman, Michael E | Mattord, Herbert J.

Edition: 3rd ed.Material type: book Book Publisher: [S.l.] : Cengage Learning, 2009Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8WHI] (1).

26. IT Risk: turning business threats into competitive advantage

by Westerman, George | Hunter, Richard.

Material type: book Book Publisher: [S.l.] : Harvard Business Review Press, 2007Online access: Click here to access online Availability: Items available for loan: Seminar Library, Information Technology [Call number: 658.4038WES] (1).

27. Cryptography and Network Security /

by Forouzan, Behrouz A.

Material type: book Book Publisher: [S.l.] : Tata McGraw-Hill, 2016Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.678FOR] (4), Seminar Library, Information Technology [Call number: 004.678FOR] (1).

28. Security in Next Generation Mobile Networks : SAE/LTE and WiMAX

by Prasad, Anand R | Seo, Seung-Woo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: [S.l.] : River Publishers, 2011Online access: eBook Availability: Items available for loan: Seminar Library, Information Technology [Call number: 004.68PRA] (1).

29. Network Security and Management

by Singh, Brijendra.

Edition: 3rd ed.Material type: computer file Computer file; Format: electronic Publisher: New Delhi PHI Learning Private Limited, 2012Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 005.8SIN (Shelf - 13C)] (1), Seminar Library, Information Technology [Call number: 005.8SIN] (1).

30. Cryptography and Network Security: principles and practices

by Stallings, William | Tahiliani, Mohit P.

Edition: 4th ed.Material type: book Book Publisher: [S.l.] : Prentice Hall, 2005Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.678STA] (34), Reference Section [Call number: 004.678STA] (2). Checked out (2).

31. CCSP CSI Exam Certification Guide /

by Dubrawsky, Ido | Grey, Paul.

Material type: book Book Publisher: [S.l.] : Cisco Press, 2003Online access: Click here to access online Availability: Items available for loan: Computerization and Networking Section [Call number: 004.6DUB] (1).

32. Introduction to Network Security /

by Jacobson, Douglas.

Edition: 1st ed.Material type: book Book Publisher: [S.l.] : Chapman and Hall/CRC, 2008Online access: Click here to access online Availability: Items available for loan: Computerization and Networking Section [Call number: 005.8JAC] (1).

33. Network Security : private communication in a public world

by Kaufman, Charlie | Perlman, Radia | Speciner, Mike.

Edition: 2nd ed.Material type: book Book Publisher: [S.l.] : Prentice Hall, 2002Online access: Click here to access online Availability: Items available for loan: Computerization and Networking Section [Call number: 005.8KAU] (1).

34. End-to-end Network Security :

by Santos, Omar.

Edition: 1st ed.Material type: book Book Publisher: [S.l.] : Cisco Press, 2007Online access: Click here to access online Availability: Items available for loan: Computerization and Networking Section [Call number: 004.678SAN] (1).

35. Inside Network Security Assessment :

by Gregg, Michael | Kim, David.

Material type: book Book Publisher: [S.l.] : Sams Publishing, 2005Online access: Click here to access online Availability: Items available for loan: Computerization and Networking Section [Call number: 004.678GRE] (1).

36. Internet security :

by Speed, Tim | Ellis, Juanita.

Edition: 1st ed.Material type: book Book Publisher: [S.l.] : Digital Press, 2003Online access: Click here to access online Availability: Items available for loan: Computerization and Networking Section [Call number: 004.678SPE] (1).

37. LAN Switch Security: what hackers know about your switches

by Vyncke, Eric | Paggen, Christopher.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: [S.l.] : Cisco Press, 2007Online access: eBook Availability: Items available for loan: Computerization and Networking Section [Call number: 004.68VYN] (1).

38. CCSP Self-Study : Cisco Secure Intrusion Detection System Csids

by Carter, Earl.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: [S.l.] : Cisco Press, 2004Online access: eBook Availability: Items available for loan: Computerization and Networking Section [Call number: 004.6TOM] (1).

39. Windows Server 2008 Networking and Network Access Protection /

by Davies, Joseph | Northrup, Tony.

Edition: First Edition.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: [S.l.] : Microsoft Press, 2008Online access: eBook Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.437DAV] (1).

40. Network Security Architectures /

by Convery, Sean.

Edition: 2nd ed.Material type: book Book Publisher: [S.l.] : Cisco Press, 2004Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.22CON] (2).


Copyright © 2018,The QUEST, Nawabshah, Shaheed Benazirabad. All rights reserved
Mr. G. Farooq Channar (Librarian) QUEST, Nawabshah, Sindh, Pakistan 67480.
 Ph#: |   0244-9370381-4 Ext. 2308   Email| [email protected]   Web|  http://www.quest.edu.pk