Search again

Found: 243  Titles

Order by :    Show:   Per Page
image
Cryptography demystified / John E. Hershey.
Author
Hershey, John E.
Published
New York : McGraw-Hill, c2003.
Call Number
QA76.9 H435c
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Cryptography for internet and database applications : developing secret and public key techniques with Java / Nick Galbreath.
Author
Galbreath, Nick.
Published
Indiana : Wiley, c2002.
Call Number
QA76.9.A25 G27c
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image

image

image
Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics / Yuri Diogenes, Erdal Ozkaya.
Author
Diogenes, Yuri.
Published
Birmingham, United Kingdom : Packt Publishing, 2018.
Call Number
Ebook

image
Data protection from insider threats Elisa Bertino
Author
Bertino, Elisa.
Published
[San Rafael, CA] : Morgan & Claypool, c2012.
Call Number
Ebook

image
Data protection from insider threats Elisa Bertino.
Author
Bertino, Elisa.
Published
San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool, c2012.
Call Number
QA76.9.A25 B473 2012,005.8 23

image
Data warehousing and data mining techniques for cyber security / by Anoop Singhal
Author
Singhal, Anoop
Published
New York, NY : Springer, c2007.
Call Number
QA76.9.A25 S542d
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Data-driven block ciphers for fast telecommunication systems / Nikolay A. Moldovyan, Alexander A. Moldovyan
Author
Moldovyan, Nikolay A.
Published
New York : Auerbach, c2008
Call Number
QA76.9.A25 M628d
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Database and applications security : integrating information security and data management / Bhavani Thuraisingham
Author
Thuraisingham, Bhavani.
Published
Boca Raton : Auerbach, c2005.
Call Number
QA76.9.D314 T45
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Defeating the hacker : a non-technical guide to computer security / Robert Schifreen
Author
Schifreen, Robert
Published
Chichester : John Wiley, c2006
Call Number
QA76.9.A25 S311d
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Defense and detection strategies against Internet worms / Jose Nazario.
Author
Nazario, Jose.
Published
Boston : Artech House, c2004.
Call Number
QA76.9.A25 N36d
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Design and implementation lightweight engine for multimedia encryption / Reatrey Pich.
Author
Reatrey Pich.
Published
2017.
Call Number
EThesis
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Designing network security / Merike Kaeo.
Author
Kaeo, Merike.
Published
Indianapolis, IN : Cisco Press, c1999.
Call Number
TK5105.59 K259d
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Designing security architecture solutions / Jay Ramachandran.
Author
Ramachandran, Jay.
Published
New York : John Wiley, c2002.
Call Number
QA76.9.A25 R285d
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles