Library Logo

Your search returned 89 results. Subscribe to this search

|
1. Beginning cryptography with Java

by Hook, David.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Indianapolis, IN : Wiley Pub., 2005Online Access: Table of contents only | Contributor biographical information | Publisher description Availability: Items available for loan: Dhaka University Science Library [005.133 HOB] (2).

2. Software engineering for secure systems : industrial and research perspectives

by Mouratidis, Haralambos.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hershey, PA : Information Science Reference, c2011Availability: Items available for loan: Dhaka University Science Library [005.8 MOS] (1).

3. Cyber security, cyber crime and cyber forensics : applications and perspectives

by Santanam, Raghu; Sethumadhavan, M; Virendra, Mohit.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hershey, PA : Information Science Reference, c2011Availability: Items available for loan: Dhaka University Science Library [005.8 CYB] (1).

4. Computer security, ESORICS 96 : 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996 : proceedings

by Bertino, Elisa. -- (4th : European Symposium on Research in Computer Security 1996 : Rome, Italy).

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Berlin ; New York : Springer, 1996Availability: Items available for loan: Dhaka University Science Library [005.8 COM] (2).

5. Information security and privacy : First Australian Conference, ACISP '96, Wollongong, NSW, Australia, June 24-26, 1996 : proceedings

by Pieprzyk, Josef; Seberry, Jennifer. -- ACISP '96 (1996 : Wollongong, N.S.W.).

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Berlin ; New York : Springer, c1996Online Access: Publisher description Availability: Items available for loan: Dhaka University Science Library [005.8 INF] (2).

6. Security policies and implementation issues

by Johnson, Rob.

Material type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Sudbury, Mass. : Jones & Bartlett Learning, c2011Availability: Items available for loan: Dhaka University Science Library [005.8 JOS] (1).

7. Information security risk analysis

by Peltier, Thomas R.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boca Raton : Auerbach Publications, 2005Online Access: Publisher description Availability: Items available for loan: Dhaka University Science Library [005.8 PEI] (1).

8. Understanding and applying cryptography and data security

by Elbirt, Adam J.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boca Raton, Fl. : CRC Press, 2009Online Access: Table of contents only Availability: Items available for loan: Dhaka University Science Library [005.8 ELU] (2).

9. Fundamentals of computer security

by Pieprzyk, Josef.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Berlin : New York : Springer, c2003Online Access: Publisher description | Table of contents only Availability: Items available for loan: Dhaka University Science Library [005.8 PIF] (1).

10. Administering Windows Vista security : the big surprises

by Minasi, Mark; Hynes, Byron; Minasi, Mark.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Indianapolis, IN : Wiley/Sybex, c2007Online Access: Table of contents only | Contributor biographical information | Publisher description Availability: Items available for loan: Dhaka University Science Library [005.8 MIA] (1).

11. Hacking exposed : network security secrets & solutions

by McClure, Stuart; Scambray, Joel; Kurtz, George.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : McGraw-Hill/Osborne, c2003; New Delhi Tata Mc Graw-Hill 2003Online Access: Publisher description | Contributor biographical information | Table of contents Availability: Items available for loan: Dhaka University Science Library [005.8 MCH] (3).

12. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006Online Access: Table of contents only Availability: Items available for loan: Dhaka University Science Library [005.82 STC] (2).

13. Protection and security on the information superhighway

by Cohen, Frederick B.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Wiley, c1995Online Access: Table of Contents | Contributor biographical information | Publisher description Availability: Items available for loan: Dhaka University Science Library [005.8 COP] (1).

14. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, N.J. : Prentice Hall, c2003Availability: Items available for loan: Dhaka University Science Library [005.82 STC] (3).

15. UNIX system security : how to protect your data and prevent intruders

by Farrow, Rik.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Reading, Mass. : Addison-Wesley Pub. Co., c1991Availability: Items available for loan: Dhaka University Science Library [005.8 FAU] (1).

16. Information security : a practical approach

by Bhaskar, S. M; Ahson, S. I.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Narosa Publishing, c2008Availability: Items available for loan: Dhaka University Science Library [005.8 BHI] (1).

17. Security patterns : integrating security and systems engineering

by Schumacher, Markus.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Chichester, England ; Hoboken, NJ : John Wiley & Sons, c2006Online Access: Table of contents Availability: Items available for loan: Dhaka University Science Library [006.4 SEC] (2).

18. Information security : principles and practice

by Stamp, Mark.

Edition: 2nd ed.Material type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Hoboken, NJ : Wiley, c2011Availability: Items available for loan: Dhaka University Science Library [005.8 STI] (1).

19. Enterprise Mac security : MAC OS X Snow Leopard

by Edge, Charles S; Barker, William.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Apress, 2010Availability: Items available for loan: Dhaka University Science Library [005.8 ENT] (1).

20. Computer security

by Gollmann, Dieter.

Edition: 2nd ed.Material type: book Book; Format: print ; Nature of contents: biography; Literary form: not fiction Publisher: New Delhi : Wiley-India , c2006Availability: Items available for loan: Dhaka University Science Library [005.8 GOC] (1).

Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login