Your search returned 148 results. Subscribe to this search

|
1. Wireless Data Technologies /

by Dubendorf, Vern A.

Edition: 1st ed.Material type: book Book Publisher: [S.l.] : Wiley, 2003Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 621.382DAB (Shelf - 57A)] (1).

2. Computer Security: art and science

by Bishop, Matt.

Material type: book Book Publisher: Delhi Pearson Education, Singapore, 2003Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 005.8BIS Shelf - 13C)] (1).

3. The Process of Network Security : designing and managing a safe network

by Wadlow, Thomas A.

Material type: book Book Publisher: Harlow, Englind Addison-Wesley Professional, 2000Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 005.8WAD Shelf - 13C)] (1).

4. Computer Security : Prinicples and Practice

by Stallings, William | Brown, Lawrie.

Material type: book Book Publisher: New Delhi Pearson Education, 2010Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8STA] (2), Stacks area [Call number: 005.8STA] (1), Reference Section [Call number: 005.8STA (Shelf - 13C)] (2), Seminar Library, Information Technology [Call number: 005.8STA] (1).

5. Inside Network Perimeter Security

by Stephen Northcutt.

Material type: book Book Publisher: New Delhi Pearson Education 2003Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 005.822NOR (Shelf - 13C)] (1).

6. Software Testing : principles and practices

by Desikan,Srinivasan | Desikan, Srinivasan.

Edition: 1st ed.Material type: book Book Publisher: New Delhi Pearson Education 2009Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 005.14DES (Shelf -06B)] (1).

7. Internet Security Secrets /

by Vacca, John R.

Material type: book Book Publisher: IDG BOOKS World wide,Inc. 1996Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 004.678VAC Shelf - 13C)] (1).

8. Software security engineering :

by Allen, Julia H | Barnum, Sean J | Ellison, Robe.

Edition: 1st ed.Material type: book Book Publisher: [S.l.] : Addison-Wesley Professional, 2008Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8ALL] (2), Seminar Library, Information Technology [Call number: 005.8ALL] (3).

9. Cryptography and Network Security : Principles and Practice

by Stallings, William.

Edition: 5th Edition.Material type: book Book Publisher: New Delhi Pearson 2011Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.678STA] (2), Reference Section [Call number: 004.678STA Shelf - 13C)] (2), Seminar Library, Information Technology [Call number: 004.678STA] (1).

10. Network Security Essentials: Applications and Standards

by Stallings, William.

Edition: 3rd editionMaterial type: book Book Publisher: New Delhi Pearson, 2009Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.678STA] (7), Reference Section [Call number: 004.6STA (Shelf - 13C)] (1), Seminar Library, Information Technology [Call number: 004.678STA] (3).

11. Network Security and Cryptography

by Menezes, Bernard.

Material type: book Book Publisher: India Cenage Learning 2011Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 004.678MEN (Shelf - 13C)] (1).

12. Network Security: Private Communication in a public world

by Kaufman Charlie | Perlman, Radia | Speciner, Mike.

Material type: book Book Publisher: New Delhi Pearson Education 2008Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004COH] (7), Reference Section [Call number: 004COH (Shelf - 13C)] (3).

13. Wireless Security

by Osterhage, Wolfgang.

Material type: book Book Publisher: UK CRC Press, 2012Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 005.8OST (Shelf - 13C)] (1), Seminar Library, Information Technology [Call number: 621.384OST] (1).

14. Network Security Essentials : Applications and Standards

by Stallings, William.

Edition: 4th ed.Material type: book Book Publisher: New Delhi Pearson Education 2011Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8STA] (7), Reference Section [Call number: 005.8STA (Shelf - 13C)] (2), Seminar Library, Information Technology [Call number: 005.8STA] (1). Checked out (1).

15. Principles of Information Security

by Whitman, Michael E | Mattord, Herbert J.

Edition: 4th ed.Material type: book Book Publisher: New Delhi Cengage Learning, 2013Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8WHI] (1), Reference Section [Call number: 005.823WHI Shelf - 13C)] (1).

16. Cryptography and Network Security : principles and practices

by Stallings, William.

Edition: 3rd ed.Material type: book Book Publisher: [S.l.] : Prentice Hall, 2002Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.678STA] (5).

17. Principles of Information Security /

by Whitman, Michael E | Mattord, Herbert J.

Edition: 1st ed.Material type: book Book Publisher: [S.l.] : Course Technology, 2003Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 658.472WHI (Shelf - 84E)] (1).

18. Introduction to Computer Security /

by Bishop, Matt | Computers--Access control.

Material type: book Book Publisher: New Delhi Pearson 2009Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 004.6008BIS] (1), Seminar Library, Information Technology [Call number: 005.8BIS] (3), Reference Section [Call number: 005.8BIS (Shelf - 13C)] (2).

19. Principles of Computer Security, Comptia Security+ and Beyond

by Conklin, Wm Arthur | White, Gregory | Cothren, Chuck.

Edition: 2nd ed.Material type: book Book Publisher: [S.l.] : McGraw-Hill Osborne Media, 2009Online access: Click here to access online Availability: Items available for loan: Central Library, QUEST, Nawabshah [Call number: 005.8CON] (2).

20. Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network

by Anonymous.

Edition: 3rd Ed:Material type: book Book Publisher: India: Techmedia, 2001Online access: Click here to access online Availability: Items available for loan: Reference Section [Call number: 005.8TEC (Shelf - 13C)] (1).


Copyright © 2018,The QUEST, Nawabshah, Shaheed Benazirabad. All rights reserved
Mr. G. Farooq Channar (Librarian) QUEST, Nawabshah, Sindh, Pakistan 67480.
 Ph#: |   0244-9370381-4 Ext. 2308   Email| lib@quest.edu.pk   Web|  http://www.quest.edu.pk