Library Logo

Your search returned 59 results. Subscribe to this search

|
1. Data networks : routing, security, and performance optimization

by Kenyon, Tony.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boston : Digital Press, c2002Online Access: Publisher description | Table of contents Availability: Items available for loan: Dhaka University Science Library [004.6 KED] (1).

2. Selinux : NSA's open source security enhanced Linux

by McCarty, Bill.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Beijing ; Sebastopol, CA : O'Reilly, c2005Other title: NSA's open source security enhanced Linux.Online Access: Publisher description | Contributor biographical information | Table of contents only Availability: Items available for loan: Dhaka University Science Library [005.432 MCS] (3).

3. Security policies and implementation issues

by Johnson, Rob.

Material type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Sudbury, Mass. : Jones & Bartlett Learning, c2011Availability: Items available for loan: Dhaka University Science Library [005.8 JOS] (1).

4. Information security risk analysis

by Peltier, Thomas R.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boca Raton : Auerbach Publications, 2005Online Access: Publisher description Availability: Items available for loan: Dhaka University Science Library [005.8 PEI] (1).

5. Outsourcing information security

by Axelrod, C. Warren.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boston : Artech House, c2004Availability: Items available for loan: Dhaka University Science Library [005.8 AXO] (1).

6. Hacking exposed : network security secrets & solutions

by McClure, Stuart; Scambray, Joel; Kurtz, George.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : McGraw-Hill/Osborne, c2003; New Delhi Tata Mc Graw-Hill 2003Online Access: Publisher description | Contributor biographical information | Table of contents Availability: Items available for loan: Dhaka University Science Library [005.8 MCH] (3).

7. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006Online Access: Table of contents only Availability: Items available for loan: Dhaka University Science Library [005.82 STC] (2).

8. Protection and security on the information superhighway

by Cohen, Frederick B.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Wiley, c1995Online Access: Table of Contents | Contributor biographical information | Publisher description Availability: Items available for loan: Dhaka University Science Library [005.8 COP] (1).

9. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, N.J. : Prentice Hall, c2003Availability: Items available for loan: Dhaka University Science Library [005.82 STC] (3).

10. Information security : a practical approach

by Bhaskar, S. M; Ahson, S. I.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Narosa Publishing, c2008Availability: Items available for loan: Dhaka University Science Library [005.8 BHI] (1).

11. SECUR

by Sud, Raman; Edelman, Ken.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: [Indianapolis, Ind.] : Que Certification, c2004Availability: Items available for loan: Dhaka University Science Library [005.8 SUS] (1).

12. Network and internetwork security : principles and practice

by Stallings, William.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Englewood Cliffs, N.J. : New York, : Prentice Hall, ; IEEE c1995Availability: Items available for loan: Dhaka University Science Library [005.8 STN] (1).

13. Multicast and group security

by Hardjono, Thomas; Dondeti, Lakshminath R.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boston, MA : Artech House, 2003Availability: Items available for loan: Dhaka University Science Library [005.8 HAM] (1).

14. Cryptography and network security

by Forouzan, Behrouz A; Mukhopadhyay, Debdeep.

Edition: 2nd ed.Material type: book Book; Format: print ; Nature of contents: biography; Literary form: not fiction Publisher: New Delhi : Tata McGraw Hill Education , c2010 (4th printing 2011)Availability: Items available for loan: Dhaka University Science Library [005.82 FOC] (1).

15. Introduction to cryptography and network security

by Forouzan, Behrouz A.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boston : McGraw-Hill Higher Education, c2008Online Access: Publisher description | Table of contents only Availability: Items available for loan: Dhaka University Science Library [005.8 FOI] (1).

16. Security complete

by -- Sybex Inc

Material type: book Book; Format: print ; Literary form: not fiction Publisher: San Francisco, CA : Sybex, 2001Online Access: Table of contents only | Publisher description | Contributor biographical information Availability: Items available for loan: Dhaka University Library [005.8 SEC] (5).

17. NT network security

by Strebe, Matthew; Perkins, Charles; Moncur, Michael G.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : BPB, 1998Availability: Items available for loan: Dhaka University Library [005.8 SNT] (1).

18. Web commerce security : design and development

by Nahari, Hadi; Krutz, Ronald L.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Indianapolis : Wiley Pub., c2011Availability: Items available for loan: Dhaka University Library [658.78 NAW] (1).

19. Auditing cloud computing : a security and privacy guide / [electronic resource]

by Halpert, Ben.

Material type: book Book; Format: available online remote; Literary form: not fiction Publisher: Hoboken, N.J. : John Wiley & Sons, ©2011Online Access: Wiley Online Library Availability: No items available

20. Cyber conflict : competing national perspectives / [electronic resource]

by Ventre, Daniel.

Material type: book Book; Format: available online remote; Literary form: not fiction Publisher: London : Hoboken, NJ : ISTE ; John Wiley & Sons, 2012Online Access: Wiley Online Library Availability: No items available

Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login