Your search returned 20 results.

Sort
Results
Threat level red : cybersecurity research programs of the US government / Michael Erbschloe. by
  • Erbschloe, Michael, 1951- [author.]
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton CRC Press 2018
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8072 Er19T.

Cybersecurity geopolitics, law and policy / Amos N. Guiora. by
  • Guiora, Amos N, 1957- [author.]
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York Routledge 2018
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 G9401C.

Principles of information security Michael E. Whitman, Ph.D., CISM, CISSP, Herbert J. Mattord, Ph.D., CISM, CISSP, Kennesaw State University. by
  • Whitman, Michael E [author.]
  • Mattord, Herbert J [author.]
Edition: 6th.ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Andover Cengage 2018
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 W5749P.

Network security essentials applications and standards William Stallings. by
  • Stallings, William [author.]
Edition: 6th.ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Tamil Nadu Pearson 2018
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 St111N.

Computer security : principles and practice William Stallings, Lawrie Brown, UNSW Canberra at the Australian Defence Force Academy. by
  • Stallings, William
  • Brown, Lawrie [author.]
Edition: Fourth Edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: 2018
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 S7751C.

Data and computer communications William Stallings. by
  • Stallings, William
Edition: 10th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Tamil Nadu Pearson Prentice Hall 2018
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 004.6 S7751D.

Attacking network protocols a hacker's guide to capture, analysis, and exploitation by James Forshaw. by
  • Forshaw, James [author.]
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: San Francisco No Starch Press 2018
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 004.62 F6921A.

Computer networks and Internets / Douglas E. Comer, Department of Computer Sciences, Purdue University, West Lafayette, IN 47907. by
  • Comer, Douglas [author.]
Edition: 6th.ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Tamil Nadu Pearson 2018
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 004.6 C728C.

Windows security monitoring : Scenarios and patterns / Andrei Miroshnikov. by
  • Miroshnikov, Andreĭ [author.]
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : John Wiley & Sons Inc , 2018Copyright date: ©2018
Availability: Items available for loan: Air University's Aerospace and Aviation Campus Kamra (1)Call number: 005.8 MIR.

Integrated networking, caching, and computing / F. Richard Yu, Tao Huang, and Yunjie Liu. by
  • Yu, F. Richard [author.]
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018
Availability: Items available for loan: Air University's Aerospace and Aviation Campus Kamra (1)Call number: 004.6782 RIC.

Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents by
  • Thompson, Eric C
Edition: Kindle Edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Ampress 2018
Availability: Items available for loan: Air University's Aerospace and Aviation Campus Kamra (1)Call number: 005.8 THO.

Hacking For Dummies by
  • Beaver, Kevin
Edition: 6th ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Dummies A Wiley Brand 2018
Availability: Items available for loan: Air University's Aerospace and Aviation Campus Kamra (1)Call number: 005.8 BEA.

Computer Networks and Internets by
  • Comer, Douglas [author.]
Edition: 6th.ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Tamil Nadu Pearson 2018
Availability: Items available for loan: Air University's Aerospace and Aviation Campus Kamra (1)Call number: 004.6 COM.

Data and Computer Communications by
  • Stallings, William
Edition: 10th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Tamil Nadu Pearson Prentice Hall 2018
Availability: Items available for loan: Air University's Aerospace and Aviation Campus Kamra (1)Call number: 004.6 STA.

Principles of Information Security by
  • Whitman, Michael E [author.]
  • Mattord, Herbert J [author.]
Edition: 6th.ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Andover Cengage 2018
Availability: Items available for loan: Air University's Aerospace and Aviation Campus Kamra (1)Call number: 005.8 WHI.

Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents by
  • Thompson, Eric C
Edition: Kindle Edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Ampress 2018
Availability: Items available for loan: Air University's Aerospace and Aviation Campus Kamra (1)Call number: 005.8 THO.

Principles of Information Security by
  • Whitman, Michael E [author.]
  • Mattord, Herbert J [author.]
Edition: 6th.ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Andover Cengage 2018
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 WHI .

Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents by
  • Thompson, Eric C
Edition: Kindle Edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Ampress 2018
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 THO.

Cybersecurity geopolitics, law and policy Amos N. Guiora. by
  • Guiora, Amos N, 1957- [author.]
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York Routledge 2018
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 005.8 GUI .

Attacking Network Protocols a hacker's guide to capture, analysis, and exploitation by James Forshaw. by
  • Forshaw, James [author.]
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: San Francisco No Starch Press 2018
Availability: Items available for loan: Air University Central Library Islamabad (1)Call number: 004.62 FOR.

Pages
Air University Sector E-9, Islamabad Paksitan
Email: librarian@au.edu.pk  Tel : +0092 51 9262612 Ext: 631