|
1.
|
Control and security of E-commerce
by Smith, Gordon E | . Edition: Material type: Text Publisher: New Jersey John Wiley & sons 2004Availability: Items available for loan:
[Call number: 681.324:658 SMI]
(1).
|
|
2.
|
Handbook of information security Vol. 2
by Bidgoli, Hossein | . Edition: Material type: Text Publisher: Wiley 2006Availability: No items available Withdrawn (1).
|
|
3.
|
Handbook of information security Vol. 3
by Bidgoli, Hossein | . Edition: Material type: Text Publisher: Wiley 2006Availability: Items available for loan:
[Call number: 681.324(100)(031) BI]
(1).
|
|
4.
|
Enhancing computer security with smart technology
by Vemuri, V. Rao ed | . Edition: Material type: Text Publisher: Boca Raton Auerbach Publications 2006Availability: Items available for loan:
[Call number: 681.324.004.4 VEM]
(1).
|
|
5.
|
Cyber terrorism
by Colarik, Andrew Michael | . Edition: Material type: Text Publisher: Hershey Idea Group Publishing 2006Availability: Items available for loan:
[Call number: 681.324(100):343.326]
(1).
|
|
6.
|
Security of e-systems and computer networks
by Obaidat, Mohammad S | Boudriga, Noureddine. Edition: Material type: Text Publisher: Cambridge Cambridge 2007Availability: Items available for loan:
[Call number: 681.324.004.4 OBA]
(1).
|
|
7.
|
International IT governance
by Calder, Alan | Watkins, Steve. Edition: Material type: Text Publisher: London Kogen Page 2008Availability: Items available for loan:
[Call number: 681.3.004.4 CAL]
(1).
|
|
8.
|
International IT governance
by Calder, Alan | Watkins, Steve. Edition: Material type: Text Publisher: London Kogan Page 2008Availability: No items available Checked out (1).
|
|
9.
|
Cryptography and network security
by Forouzan, Behrouz A | . Edition: Spl. IndiaMaterial type: Text Publisher: New Delhi Tata McGraw-Hill 2008Availability: Items available for loan:
[Call number: 681.324.004.4 FOR]
(1).
|
|
10.
|
Information security risk analysis
by Peltier, Thomas R | . Edition: 2.0Material type: Text Publisher: Boca Raton Auerbach 2005Availability: Items available for loan:
[Call number: 681.3.004.4 PEL]
(1).
|
|
11.
|
CERT guide to system and network security practices
by Allen, Julia H | . Edition: Material type: Text Publisher: New York Addison-Wesley 2001Availability: Items available for loan:
[Call number: 681.3.004.4 ALL]
(1).
|
|
12.
|
Information assurance architecture
by Willett, Keith D | . Edition: Material type: Text Publisher: New York CRC Press 2008Availability: Items available for loan:
[Call number: 681.3.004.4 WIL]
(1).
|
|
13.
|
Information security governance
by Solms,R Von | Solms,S H Von. Edition: Material type: Text Publisher: New York Springer 2009Availability: Items available for loan:
[Call number: 65.012.45.004.4 SOL]
(1).
|
|
14.
|
Digital defense
by Parenty, Thomas J | . Edition: Material type: Text Publisher: Boston Harvard business school press 2003Availability: Items available for loan:
[Call number: 681.324:658 PAR]
(1).
|
|
15.
|
Securing the information infrastructure
by Kizza, Joseph | Kizza, Florence Migga. Edition: Material type: Text Publisher: Hershey Cybertech 2008Availability: Items available for loan:
[Call number: 681.3.004.4 KIZ]
(1).
|
|
16.
|
Information System Audit and Assurance
by Dube, D.P | Gulati, V.P. Edition: Material type: Text Publisher: New Delhi Tata McGraw-Hill 2005Availability: Items available for loan:
[Call number: 657.6:681.324 DUB/I]
(1).
|
|
17.
|
Auditing cloud computing
by Halpert, Ben | . Edition: Material type: Text Publisher: New Jersey John Wiley and Sons 2011Availability: Items available for loan:
[Call number: 681.324:658 HAL/A]
(1).
|
|
18.
|
Introduction to information security
by Shimeall, Timothy J | Spring, Jonathan M. Edition: Material type: Text Publisher: USA Syngress 2014Availability: Items available for loan:
[Call number: 681.3.004.4 SHI/I]
(1).
|
|
19.
|
IT governance An international Guide to data security and ISO27001/ISO2700
by Calder, Alan | Watkins, Steve. Edition: 6th ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: London Kogan Page c2015Availability: Items available for loan:
[Call number: 681.324.004.4 CAL/I]
(1).
|
|
20.
|
Web security A whitehat perspective
by Wu, Hanqing | Zhao, Liz. Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: New York CRC Press 2015Availability: Items available for loan:
[Call number: 681.324.004.4 WU/W]
(1).
|