Results
|
|
|
Image from Amazon.com
|
Cybersecurity geopolitics, law and policy by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York Routledge 2018
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 GUI.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
|
|
|
|
Image from Amazon.com
|
|
|
|
|
Local cover image
Image from Amazon.com
|
|
|
|
|
Image from Amazon.com
|
Blockchain For Dummies by
Material type: Text; Format:
print
; Literary form:
Not fiction
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.7 LAU.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
|
|
|
|
Image from Amazon.com
|
|
|
|
|
Image from Amazon.com
|
Reversing secrets of reverse engineering by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Indianapolis, IN : Wiley, 2005
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.1 EIL.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
The Hacker Playbook 3 Practical Guide To Penetration Testing by
Edition: Red Team Edition
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Secure Planet LLC 2018
Availability: Items available for loan: Air University Central Library Islamabad (5)Call number: 005.1 KIM, ... Not available: Air University Central Library Islamabad: Checked out (1).
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
|
|
|
|
Image from Amazon.com
|
Virtualization Security: Protecting Virtualized Environments
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi: John Wiley, 2013
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 SHA.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
|
|
|
|
Image from Amazon.com
|
The art of deception controlling the human element of security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Indianapolis, Ind. : Wiley, 2002
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 MIT.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
The network security test lab a step-by-step guide by
Material type: Text; Format:
print
; Literary form:
Not fiction
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 GRE.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
Cybersecurity for dummies by
Edition: 1st ed..
Material type: Text; Format:
print
; Literary form:
Not fiction
Availability: Not available: Air University Central Library Islamabad: In transit (1).
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
|
|
|
|
Image from Amazon.com
|
Security Information and Event Management (SIEM) Implementation by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York : McGraw-Hill, 2011
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 MIL-S.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
|
Formal Correctness of Security Protocols by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Heidelberg Springer 2007
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 BEL-F.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
Pseudorandomness and cryptographic applications by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Princeton, NJ : Princeton University Press, 1996
Availability: Not available: Air University Central Library Islamabad: Checked out (1).
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
|