Search again

Found: 224  Titles

Order by :    Show:   Per Page
image
Critical information infrastructures resilience and protection / Maitland Hyslop
Author
Hyslop, Maitland.
Published
New York : Springer, c2007
Call Number
Ebook

image
Cryptography and e-commerce : a Wiley tech brief / Jon C. Graff.
Author
Graff, Jon C.
Published
New York : John Wiley, c2001.
Call Number
QA76.9.A25 G7c
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Cryptography and network security / Atul Kahate.
Author
Kahate, Atul.
Published
Boston : McGraw-Hill, c2003.
Call Number
TK5105.59 K263c
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Cryptography and network security / Behrouz A. Forouzan
Author
Forouzan, Behrouz A
Published
Boston : McGraw-Hill, c2008.
Call Number
TK5105.59 F653c
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Cryptography and network security : principles and practice / William Stallings.
Author
Stallings, William.
Published
Upper Saddle River, NJ : Prentice Hall International, c1999.
Call Number
TK5105.59 S69c 1999
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Cryptography and network security : principles and practice / William Stallings.
Author
Stallings, William.
Published
Upper Saddle River : Pearson/Prentice Hall, c2006.
Call Number
TK5105.59 S69c 2006
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Cryptography and network security : principles and practice / William Stallings.
Author
Stallings, William.
Published
Boston : Prentice Hall, c2011.
Call Number
TK5105.59 S69c 2011
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Cryptography and network security : principles and practice / William Stallings.
Author
Stallings, William
Published
Boston : Pearson, c2014.
Call Number
TK5105.59 S69c 2014
Location
ห้องสมุดวิทยาเขตชุมพรเขตรอุดมศักดิ์

image
Cryptography and network security : principles and practice / William Stallings.
Author
Stallings, William.
Published
Upper Saddle River, NJ : Prentice Hall, c2003.
Call Number
TK5105.95 S69c 2003
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Cryptography and public key infrastructure on the Internet / Klaus Schmeh.
Author
Schmeh, Klaus.
Published
Chichester : John Wiley, c2003.
Call Number
QA76.9.A25 S32c
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Cryptography demystified / John E. Hershey.
Author
Hershey, John E.
Published
New York : McGraw-Hill, c2003.
Call Number
QA76.9 H435c
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image

image

image
Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics / Yuri Diogenes, Erdal Ozkaya.
Author
Diogenes, Yuri.
Published
Birmingham, United Kingdom : Packt Publishing, 2018.
Call Number
Ebook

image
Data protection from insider threats Elisa Bertino
Author
Bertino, Elisa.
Published
[San Rafael, CA] : Morgan & Claypool, c2012.
Call Number
Ebook

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles