SUMMON Search
SEARCH ALL HEC DIGITAL LIBRARY RESOURCES


Quick Search :

Web Online Public Access Catalog - Use the search options to find documents quickly
Found 62 from your keywords:
Subject : "Computer Security"
You currently on page 2 of 7 page(s)
Query took 2.5331 second(s) to complete
 First Page   Previous   1   2   3   4   5   Next   Last Page 

Artificial immune system applications in computer security
Author(s) : Tan, Ying -
Edition :
Call Number : 005.8 TAN
Information privacy fundamentals for librarians and information professionals
Author(s) : Givens, Cherie L. -
Edition :
Call Number : 025.5 GIV
Guide to network security
Author(s) : Whitman, Michael E. -
Edition :
Call Number : 005.8 GUI
Internet cryptography
Author(s) : Smith, Richard E. -
Edition :
Call Number : 005.82 SMI
Information security architecture
Author(s) : Tudor, Jan Killmeyer -
Edition :
Call Number : 005.8 TUD
Computers, ethics and society
Author(s) : Ermann, M. David - Shauf, Michele S. -
Edition : 3rd ed.
Call Number : 303.4834 COM/2003
Inside network perimeter security
Author(s) : Northcutt, Stephen -
Edition : 2nd ed.
Call Number : 005.8 INS/2005
Security engineering
Author(s) : Anderson, Ross J. -
Edition :
Call Number : 005.8 AND
Artificial intelligence and security in computing systems
Author(s) : Soldek, Jerzy - Drobiazgiewicz, Leszek -
Edition :
Call Number : 006.3 INT/2002
Cryptanalysis of number theoretic ciphers
Author(s) : Wagstaff, Samuel S. -
Edition :
Call Number : 005.8 WAG

 First Page   Previous   1   2   3   4   5   Next   Last Page 




Select Language

Advanced Search

Title :
Author(s) :
  • SEARCHING...

Subject(s) :
  • SEARCHING...

Call # :
ISBN/ISSN :
GMD : Collection Type : Location :

Developed By

Computer Centre, Q.A.U