Results
|
|
Image from Amazon.com
|
Hands on Ethical Hacking and Network Defense by
Publication details: Boston, MA Course Technology, Cengage Learning 2011
Availability: Items available for loan: Air University Kharian Campus Library (1)Call number: 005.8 SIM-H.
|
|
|
Image from Amazon.com
|
|
|
|
Image from Amazon.com
|
|
|
|
Image from Amazon.com
|
Malware, Rootkits & Botnets : A Beginner's Guide by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York McGraw-Hill 3013
Availability: Items available for loan: Air University Kharian Campus Library (1)Call number: 005.8 ELI-M.
|
|
|
Image from Amazon.com
|
Network Forensics by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Indianapolis, IN Wiley 2017
Availability: Items available for loan: Air University Kharian Campus Library (1)Call number: 005.8 MES-N.
|
|
|
Image from Amazon.com
|
|
|
|
Image from Amazon.com
|
Secrets and Lies : Digital Security in a Networked World by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Indianapolis, Indiana, John Wiley & Sons, Inc 2015
Availability: Items available for loan: Air University Kharian Campus Library (1)Call number: 005.8 SCH-S.
|
|
|
Image from Amazon.com
|
|
|
|
Image from Amazon.com
|
Security Metrics :A Beginner's Guide by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York McGraw-Hill 2012
Availability: Items available for loan: Air University Kharian Campus Library (1)Call number: 005.8 WON-S.
|
|
|
Image from Amazon.com
|
Network Security Essentials: Application and Standards by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: India Pearson Education Services Pvt. Ltd 2017
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 STA-N.
|
|
|
Image from Amazon.com
|
|
|
|
Image from Amazon.com
|
|
|
|
|
Managing Information Security Risks : The OCTAVE Approach by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River Addison-Wesley Professional 2002
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 ALB-M.
|
|
|
Image from Amazon.com
|
Management of Information Security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston, MA Cengage Learning 2019
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 WHI-M.
|
|
|
Image from Amazon.com
|
|
|
|
Image from Amazon.com
|
|
|
|
Image from Amazon.com
|
|
|
|
Image from Amazon.com
|
Secure Coding in C and C++ by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, NJ Addison-Wesley 2013
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 SEA-S.
|
|
|
Image from Amazon.com
|
Threat Modeling : Designing for Security by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Indianapolis, IN John Wiley and Sons 2014
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 SHO-T.
|
|
|
Image from Amazon.com
|
Software Security Engineering : A Guide for Project Managers by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, N.J. Addison-Wesley 2008
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 ALL-S.
|