CENTRAL LIBRARY

Welcome to Online Public Access Catalogue (OPAC)

Your search returned 36 results.

Sort
Results
1.
Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Prentice Hall PTR, c2002.[Reprinted 2005]
Availability: Items available for loan: Central Library, KUET (5)Call number: 005.8 KAU, ...
2.
Information security risk analysis / Thomas R. Peltier. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Fiction
Publication details: Boca Raton : Auerbach Publications, c2005
Online access:
Availability: Items available for loan: Central Library, KUET (2)Call number: 005.8 PEL, ...
3.
Microsoft encyclopedia of security / Mitch Tulloch. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Redmond, Wash. : New Delhi : Microsoft Press ; Prentice-Hall, c2003 [reprinted 2004]
Availability: Items available for loan: Central Library, KUET (1)Call number: 005.803 TUL.
4.
Security for ubiquitous computing / Frank Stajano. by Series: Wiley series in communications networking & distributed systems
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: West Sussex, England ; New York : J. Wiley & Sons, c2002
Availability: Items available for loan: Central Library, KUET (1)Call number: 005.8 STA.
5.
Network security / Steven L. Shaffer, Alan R. Simon. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : AP Professional, c1994
Availability: Items available for loan: Central Library, KUET (1)Call number: 005.8 SHA.
6.
Network security essentials : applications and standards / William Stallings. by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Pearson Education, c2007
Online access:
Availability: Items available for loan: Central Library, KUET (2)Call number: 005.8 STA, ...
7.
Security for telecommunications network management / Moshe Rozenblit. by Series: IEEE series on network management
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : IEEE Press, c2000
Availability: Items available for loan: Central Library, KUET (2)Call number: 621.382 ROZ, ...
8.
Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, c2003
Availability: Items available for loan: Central Library, KUET (1)Call number: 005.8 MCC.
9.
Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, c2003
Availability: Items available for loan: Central Library, KUET (1)Call number: 005.8 MCC.
10.
Network security essentials : applications and standards / William Stallings. by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Delhi : Pearson Education, c2011[reprinted 2013]
Availability: Items available for loan: Central Library, KUET (1)Call number: 005.8 STA. Items available for reference: Central Library, KUET: Not For Loan (1)Call number: 005.8 STA.
11.
Fundamentals network security / Eric Maiwld by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : McGraw Hill, c2004.[Reprinted 2010, 2013]
Availability: Items available for loan: Central Library, KUET (1)Call number: 005.8 MAI. Items available for reference: Central Library, KUET: Not For Loan (1)Call number: 005.8 MAI.
12.
Auditing cloud computing : a security and privacy guide / [edited by] Ben Halpert. by Series: Wiley corporate F & A ; 21.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Hoboken, N.J. : John Wiley & Sons, ©2011
Online access:
Availability: No items available.
13.
Cyber conflict : competing national perspectives / edited by Daniel Ventre. by Series: ISTE
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: London : Hoboken, NJ : ISTE ; John Wiley & Sons, 2012
Online access:
Availability: No items available.
14.
Cybercrime and cyberwarfare / Igor Bernik. by Series: Focus series
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: London, UK : Hoboken, NJ : ISTE Ltd ; John Wiley & Sons, Inc., 2014Copyright date: ©2014
Online access:
Availability: No items available.
15.
Cybersecurity for executives : a practical guide / by Gregory J. Touhill and C. Joseph Touhill. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Hoboken, New Jersey : John Wiley & Sons, [2014]
Online access:
Availability: No items available.
16.
Network Security / André Perez. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: London : Hoboken, NJ : ISTE ; Wiley, 2014
Online access:
Availability: No items available.
17.
Understanding Bitcoin : Cryptography, Engineering and Economics / Pedro Franco. by Series: Wiley finance series
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Chichester, West Sussex : Wiley, 2015
Online access:
Availability: No items available.
18.
Security intelligence : a practitioner's guide to solving enterprise security challenges / Qing Li, Gregory Clark. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, 2015
Online access:
Availability: No items available.
19.
20.
Introduction to network security : theory and practice / Jie Wang, Department of Computer Science at the University of Massachusetts Lowell and Zachary A. Kissel, Department of Computer Science at Merrimack College in North Andover, MA. by
Edition: Second edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Hoboken, NJ : Singapore : Wiley ; HEP, 2015
Online access:
Availability: No items available.
21.
Network attacks and exploitation : a framework / Matthew Monte. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, 2015Copyright date: ©2015
Other title:
  • Network attacks & exploitation
Online access:
Availability: No items available.
22.
The network security test lab : a step-by-step guide / Michael Gregg. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, [2015]Copyright date: ©2015
Online access:
Availability: No items available.
23.
The antivirus hacker's handbook / Joxean Koret, Elias Bachaalany. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, IN : John Wiley & Sons, Inc., [2015]Copyright date: ©2015
Online access:
Availability: No items available.
24.
Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs. by Series: IEEE Press series on information & communication networks security
Edition: Second edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Piscataway, NJ : Hoboken, N.J. : IEEE Press ; Wiley, [2016]Copyright date: ©2016
Online access:
Availability: No items available.
25.
Distributed networks : intelligence, security, and applications / edited by Qurban A. Memon. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Boca Raton : Taylor & Francis, 2014
Availability: No items available.
26.
Handbook of financial cryptography and security [electronic resource] / editor, Burton Rosenberg. by Series: Chapman & Hall/CRC cryptography and network security
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Boca Raton : Chapman & Hall/CRC, 2010
Availability: No items available.
27.
Network anomaly detection : a machine learning perspective / Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Boca Raton : CRC Press, [2014]Copyright date: �201
Availability: No items available.
28.
29.
Honeypot [electronic resource] : a new paradigm to information security / R.C. Joshi, Anjali Sardana. by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Enfield, N.H. : Science Publishers, 2011
Availability: No items available.
30.
Enhancing computer security with smart technology [electronic resource] / editor, V. Rao Vemuri. by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Boca Raton, FL : Auerbach Publications, 2006
Availability: No items available.
31.
Iris biometric model for secured network access [electronic resource] / Franjieh El Khoury. by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, 2013
Availability: No items available.
32.
Security and policy driven computing [electronic resource] / Lei Liu. by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Boca Raton, Fla. : CRC Press, c2011
Availability: No items available.
33.
Data mining tools for malware detection [electronic resource] / Mehedy Masud, Latifur Khan and Bhavani Thuraisingham. by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Boca Raton, Fla. : CRC Press, 2012
Availability: No items available.
34.
What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco. by Series: What every engineer should kno | What every engineer should know
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Boca Raton : CRC Press, [2014]Copyright date: �201
Other title:
  • Cyber security and digital forensics
Availability: No items available.
35.
What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco. by Series: What every engineer should kno | What every engineer should know
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Boca Raton : CRC Press, [2014]Copyright date: �201
Other title:
  • Cyber security and digital forensics
Availability: No items available.
36.
Pages

Khulna University of Engineering & Technology

Funded by: HEQEP, UGC, Bangladesh