Library Logo

Your search returned 111 results. Subscribe to this search

|
1. Computational models of risks to infrastructure

by Skanata, Dejan; Byrd, Daniel M. -- North Atlantic Treaty Organization. Public Diplomacy Division; NATO Science for Peace and Security Programme -- NATO Advanced Research Workshop on Computational Models of Risks to Infrastructure (2006 : Primošten, Croatia).

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Amsterdam, Netherlands ; Washington, DC : IOS Press, 2007Online Access: Table of contents only Availability: Items available for loan: Dhaka University Science Library [003.30113 COM] (1).

2. Data networks : routing, security, and performance optimization

by Kenyon, Tony.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boston : Digital Press, c2002Online Access: Publisher description | Table of contents Availability: Items available for loan: Dhaka University Science Library [004.6 KED] (1).

3. Selinux : NSA's open source security enhanced Linux

by McCarty, Bill.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Beijing ; Sebastopol, CA : O'Reilly, c2005Other title: NSA's open source security enhanced Linux.Online Access: Publisher description | Contributor biographical information | Table of contents only Availability: Items available for loan: Dhaka University Science Library [005.432 MCS] (3).

4. Cyber security, cyber crime and cyber forensics : applications and perspectives

by Santanam, Raghu; Sethumadhavan, M; Virendra, Mohit.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hershey, PA : Information Science Reference, c2011Availability: Items available for loan: Dhaka University Science Library [005.8 CYB] (1).

5. Security and privacy assurance in advancing technologies : new developments

by Nemati, Hamid R.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hershey, PA : Information Science Reference, c2011Availability: Items available for loan: Dhaka University Science Library [005.8 SEC] (1).

6. Security policies and implementation issues

by Johnson, Rob.

Material type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Sudbury, Mass. : Jones & Bartlett Learning, c2011Availability: Items available for loan: Dhaka University Science Library [005.8 JOS] (1).

7. Information security risk analysis

by Peltier, Thomas R.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boca Raton : Auerbach Publications, 2005Online Access: Publisher description Availability: Items available for loan: Dhaka University Science Library [005.8 PEI] (1).

8. Outsourcing information security

by Axelrod, C. Warren.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boston : Artech House, c2004Availability: Items available for loan: Dhaka University Science Library [005.8 AXO] (1).

9. Hacking exposed : network security secrets & solutions

by McClure, Stuart; Scambray, Joel; Kurtz, George.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : McGraw-Hill/Osborne, c2003; New Delhi Tata Mc Graw-Hill 2003Online Access: Publisher description | Contributor biographical information | Table of contents Availability: Items available for loan: Dhaka University Science Library [005.8 MCH] (3).

10. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006Online Access: Table of contents only Availability: Items available for loan: Dhaka University Science Library [005.82 STC] (2).

11. Protection and security on the information superhighway

by Cohen, Frederick B.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Wiley, c1995Online Access: Table of Contents | Contributor biographical information | Publisher description Availability: Items available for loan: Dhaka University Science Library [005.8 COP] (1).

12. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, N.J. : Prentice Hall, c2003Availability: Items available for loan: Dhaka University Science Library [005.82 STC] (3).

13. Information security : a practical approach

by Bhaskar, S. M; Ahson, S. I.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Narosa Publishing, c2008Availability: Items available for loan: Dhaka University Science Library [005.8 BHI] (1).

14. SECUR

by Sud, Raman; Edelman, Ken.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: [Indianapolis, Ind.] : Que Certification, c2004Availability: Items available for loan: Dhaka University Science Library [005.8 SUS] (1).

15. Network and internetwork security : principles and practice

by Stallings, William.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Englewood Cliffs, N.J. : New York, : Prentice Hall, ; IEEE c1995Availability: Items available for loan: Dhaka University Science Library [005.8 STN] (1).

16. Applied cryptography : protocols, algorithms, and source code in C

by Schneier, Bruce.

Edition: 2nd ed.Material type: book Book; Format: print ; Nature of contents: biography; Literary form: not fiction Publisher: New Delhi : Wiley-India , c2006Availability: Items available for loan: Dhaka University Science Library [005.82 SCA] (1).

17. Multicast and group security

by Hardjono, Thomas; Dondeti, Lakshminath R.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boston, MA : Artech House, 2003Availability: Items available for loan: Dhaka University Science Library [005.8 HAM] (1).

18. Cryptography and network security

by Forouzan, Behrouz A; Mukhopadhyay, Debdeep.

Edition: 2nd ed.Material type: book Book; Format: print ; Nature of contents: biography; Literary form: not fiction Publisher: New Delhi : Tata McGraw Hill Education , c2010 (4th printing 2011)Availability: Items available for loan: Dhaka University Science Library [005.82 FOC] (1).

19. Introduction to cryptography and network security

by Forouzan, Behrouz A.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boston : McGraw-Hill Higher Education, c2008Online Access: Publisher description | Table of contents only Availability: Items available for loan: Dhaka University Science Library [005.8 FOI] (1).

20. Bluetooth security

by Gehrmann, Christian; Persson, Joakim; Smeets, Ben.

Material type: book Book; Format: print ; Nature of contents: biography; Literary form: not fiction Publisher: Boston : Artech House, c2004Availability: Items available for loan: Dhaka University Science Library [005.8 GEB] (1).

Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login