Results
|
|
|
Image from Amazon.com
|
|
|
|
|
Image from Amazon.com
|
AI Algorithms, Data Structures, and Idioms in Prolog, Lisp, and Java by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston, MA Pearson Addison-Wesley 2009
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 LUG-A.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
Secure Coding in C and C++ by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, NJ Addison-Wesley 2013
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 SEA-S.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
Threat Modeling : Designing for Security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Indianapolis, IN John Wiley and Sons 2014
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 SHO-T.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
Software Security Engineering : A Guide for Project Managers by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, N.J. Addison-Wesley 2008
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 ALL-S.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
Introduction to Software Testing by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Cambridge, United Kingdom Cambridge University Press 2017
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 AMM-S.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
Security in Embedded Devices by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: LLC, Boston, MA Springer Science+Business Media 2010
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 GEB-S.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
Securing the Cloud : Cloud Computer Security Techniques and Tactics by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Burlington, MA Elsevier 2011
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 WIN-S.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
|
|
|
|
Image from Amazon.com
|
Mastering Reverse Engineering : Re-Engineer Your Ethical Hacking Skills by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Birmingham Packt Publishing Ltd 2018
Availability: Items available for loan: Air University Central Library Islamabad (2)Call number: 005.8 WON-M, ... Not available: Air University Central Library Islamabad: Checked out (1).
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
Vulnerability Management by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boca Raton, FL CRC Pressimpring of Taylor & Francis Group 2019
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 FOR-V.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
|
|
|
|
Image from Amazon.com
|
Wireless and Mobile Device Security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Burlington JONES & BARTLETT LEARNING, [S.l.] 2022
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 DOH-W.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
|
|
|
|
Image from Amazon.com
|
Security in Wireless Mesh Networks by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boca Raton, FL CRC Press 2009
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 ZHA-S.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
|
|
|
|
Image from Amazon.com
|
|
|
|
|
Image from Amazon.com
|
Security in Embedded Devices by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York Springer 2010
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 GEB-S.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
Machine Learning for Embedded System Security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Cham Springer 2022
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 BAS-M.
star rating
Average : 0.0 out of 5 stars
|
|
|
|
Image from Amazon.com
|
|