Library Logo

Your search returned 89 results. Subscribe to this search

|
21. Network and internetwork security : principles and practice

by Stallings, William.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Englewood Cliffs, N.J. : New York, : Prentice Hall, ; IEEE c1995Availability: Items available for loan: Dhaka University Science Library [005.8 STN] (1).

22. Applied cryptography : protocols, algorithms, and source code in C

by Schneier, Bruce.

Edition: 2nd ed.Material type: book Book; Format: print ; Nature of contents: biography; Literary form: not fiction Publisher: New Delhi : Wiley-India , c2006Availability: Items available for loan: Dhaka University Science Library [005.82 SCA] (1).

23. Verification of infinite-state systems with applications to security

by Clarke, Edmund; Minea, Marius; Ţiplea, Ferucio Laurenţiu. -- NATO Advanced Research Workshop on Verification of Infinite-state Systems with Applications to Security (2005 March 17-22 : Timaşoara, Romania).

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Amsterdam ; Washington, D.C. : IOS Press, c2006Availability: Items available for loan: Dhaka University Science Library [005.8 VER] (1).

24. Security, IFIP/Sec'83 : proceedings of the First Security Conference, Stockholm, Sweden, 16-19 May 1983

by Fåk, Viiveke. -- Svenska samfundet för informationsbehandling; International Federation for Information Processing -- (1st : Security Conference 1983 : Stockholm, Sweden).

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : North Holland, c1983Availability: Items available for loan: Dhaka University Science Library [658.478 FAS] (1).

25. Session-keys for secured electronic transactions / [M.Phil Thesis]

by Jabiullah, M. Ismail.

Material type: book Book; Format: print ; Nature of contents: biography; Literary form: not fiction Publisher: Dhaka : University of Dhaka, 2008Availability: Items available for reference: Dhaka University Science Library [005.8 JAS] (1 ).

26. Computers, ethics, and society

by Ermann, M. David; Shauf, Michele S.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Oxford University Press, 2003Availability: Items available for loan: Dhaka University Library [303.4834 COM] (2).

27. Netspionage : the global threat to information

by Boni, William C; Kovacich, Gerald L.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boston : Butterworth-Heinemann, 2000Online Access: Publisher description | Table of contents Availability: Items available for loan: Dhaka University Library [364.168 BON] (1).

28. Computer fraud and countermeasures

by Krauss, Leonard I; MacGahan, Aileen.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Englewood Cliffs, N.J. : Prentice-Hall, c1979Availability: Items available for loan: Dhaka University Library [364.1 KRC] (1).

29. Information security management : concepts and practice

by Raggad, Bel G.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: London : CRC , 2010Availability: Items available for loan: Dhaka University Library [005.8 RAI] (2).

30. Security complete

by -- Sybex Inc

Material type: book Book; Format: print ; Literary form: not fiction Publisher: San Francisco, CA : Sybex, 2001Online Access: Table of contents only | Publisher description | Contributor biographical information Availability: Items available for loan: Dhaka University Library [005.8 SEC] (5).

31. Information security : policy, processes, and practices

by Straub, Detmar W; Goodman, Seymour E; Baskerville, Richard. -- ebrary, Inc

Material type: book Book; Format: electronic ; Literary form: not fiction Publisher: New Delhi : PHI, 2009Online Access: Click here for full text. Availability: Items available for loan: Dhaka University Library [658.4038 INF] (1).

32. The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets

by Wallace, Michael; Webber, Lawrence.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : American Management Association, c2007Online Access: Table of contents Availability: Items available for loan: Dhaka University Library [658.477 WAD] (1).

33. Web commerce security : design and development

by Nahari, Hadi; Krutz, Ronald L.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Indianapolis : Wiley Pub., c2011Availability: Items available for loan: Dhaka University Library [658.78 NAW] (1).

34. Computers under attack : intruders, worms, and viruses

by Denning, Peter J.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Reading, Mass. : Addison-Wesley, c1990Availability: Items available for loan: Dhaka University Library [005.8 COM] (1).

35. Compute!'s computer security

by Roberts, Ralph; Kane, Pamela.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Greensboro, N.C. : Compute! Books, c1989Availability: Items available for loan: Dhaka University Library [005.8 ROB] (1).

36. Information security : principles and practice / [electronic resource]

by Stamp, Mark.

Edition: 2nd ed.Material type: book Book; Format: available online remote; Literary form: not fiction Publisher: Hoboken, N.J. : Wiley, ©2011Online Access: Wiley Online Library Availability: No items available

37. Healthcare fraud : auditing and detection guide / [electronic resource]

by Busch, Rebecca S.

Edition: 2nd ed.Material type: book Book; Format: available online remote; Literary form: not fiction Publisher: Hoboken, N.J. : John Wiley & Sons, ©2012Online Access: Wiley Online Library Availability: No items available

38. Auditor's guide to IT auditing / [electronic resource]

by Cascarino, Richard; Cascarino, Richard.

Edition: 2nd ed.Material type: book Book; Format: available online remote; Literary form: not fiction Publisher: Hoboken, N.J. : Wiley, ©2012Online Access: Wiley Online Library Availability: No items available

39. Cyber security policy guidebook / [electronic resource]

by Bayuk, Jennifer L.

Material type: book Book; Format: available online remote; Literary form: not fiction Publisher: Hoboken, N.J. : Wiley, ©2012Online Access: Wiley Online Library Availability: No items available

40. Reliability and availability of cloud computing / [electronic resource]

by Bauer, Eric; Adams, Randee. -- Wiley InterScience (Online service)

Material type: book Book; Format: available online remote; Literary form: not fiction Publisher: Hoboken, N.J. : Wiley-IEEE Press, 2012Online Access: Wiley Online Library Availability: No items available

Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login