Search again

Found: 27  Titles

Order by :    Show:   Per Page
image
Applied cryptanalysis : breaking ciphers in the real world / Mark Stamp, Richard M. Low
Author
Stamp, Mark
Published
Hoboken, NJ : John Wiley, c2007.
Call Number
QA76.9.A25 S69a
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Beginning information cards and Cardspace from novice to professional / Marc Mercuri
Author
Mercuri, Marc.
Published
Berkeley, CA : Apress, c2007.
Call Number
Ebook

image

image
Computer security and cryptography / Alan G. Konheim
Author
Konheim, Alan G
Published
Hoboken, NJ : John Wiley, c2007.
Call Number
QA76.9.A25 K632c
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Computer system security : basic concepts and solved exercises / Gildas Avoine, Pascal Junod and Philippe Oechslin
Author
Avoine, Gildas
Published
Lausanne : EPFL Press, c2007.
Call Number
QA76.9.A25 A95c
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Critical information infrastructures resilience and protection / Maitland Hyslop
Author
Hyslop, Maitland.
Published
New York : Springer, c2007
Call Number
Ebook

image
Data warehousing and data mining techniques for cyber security / by Anoop Singhal
Author
Singhal, Anoop
Published
New York, NY : Springer, c2007.
Call Number
QA76.9.A25 S542d
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Electronic postage systems technology, security, economics / by Gerrit Bleumer
Author
Bleumer, Gerrit.
Published
New York : Springer, c2007.
Call Number
Ebook

image
Grid computing security Anirban Chakrabarti
Author
Chakrabarti, Anirban.
Published
Berlin : Springer, c2007.
Call Number
Ebook

image
Hacking exposed VoIP : voice over IP security secrets & solutions / David Endler, Mark Collier
Author
Endler, David
Published
New York, NY : McGraw-Hill, c2007.
Call Number
QA76.9.A25 E6h
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image

image
Introduction to cryptography principles and applications / Hans Delfs, Helmut Knebl.
Author
Delfs, Hans.
Published
Berlin : Springer, c2007.
Call Number
Ebook

image
IT security interviews exposed : secrets to landing your next information security job / Chris Butler ... [et al.]
Published
Indianapolis, IN : Wiley, c2007.
Call Number
T58.5 I87
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Metasploit toolkit : for penetration testing, exploit development, and vulnerability research / David Maynor, K.K. Mookhey.
Author
Maynor, David.
Published
Burlington, MA : Syngress, c2007.
Call Number
QA76.9.A25 M35m
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Microsoft Vista for IT security professionals / Anthony Piltzecker, technical editor.
Published
Rockland, MA : Syngress, c2007.
Call Number
QA76.9.A25 M51
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles