CENTRAL LIBRARY

Welcome to Online Public Access Catalogue (OPAC)

Your search returned 36 results. Subscribe to this search

|
1. Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner.

by Kaufman, Charlie | Perlman, Radia | Speciner, Michael.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Prentice Hall PTR, c2002.[Reprinted 2005]Availability: Items available for loan: [Call number: 005.8 KAU] (5).
2. Information security risk analysis / Thomas R. Peltier.

by Peltier, Thomas R.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Fiction Publisher: Boca Raton : Auerbach Publications, c2005Online access: Publisher description Availability: Items available for loan: [Call number: 005.8 PEL] (2).
3. Microsoft encyclopedia of security / Mitch Tulloch.

by Tulloch, Mitch.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Redmond, Wash. : New Delhi : Microsoft Press ; Prentice-Hall, c2003 [reprinted 2004]Online access: Contributor biographical information | Publisher description Availability: Items available for loan: [Call number: 005.803 TUL] (1).
4. Security for ubiquitous computing / Frank Stajano.

by Stajano, Frank.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: West Sussex, England ; New York : J. Wiley & Sons, c2002Online access: Publisher description | Table of contents Availability: Items available for loan: [Call number: 005.8 STA] (1).
5. Network security / Steven L. Shaffer, Alan R. Simon.

by Shaffer, Steven L | Simon, Alan R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston : AP Professional, c1994Availability: Items available for loan: [Call number: 005.8 SHA] (1).
6. Network security essentials : applications and standards / William Stallings.

by Stallings, William.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Pearson Education, c2007Online access: Table of contents only Availability: Items available for loan: [Call number: 005.8 STA] (2).
7. Security for telecommunications network management / Moshe Rozenblit.

by Rozenblit, Moshe, 1944-.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : IEEE Press, c2000Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: [Call number: 621.382 ROZ] (2).
8. Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah.

by McClure, Stuart | Shah, Saumil | Shah, Shreeraj.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston : Addison-Wesley, c2003Availability: Items available for loan: [Call number: 005.8 MCC] (1).
9. Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah.

by McClure, Stuart | Shah, Saumil | Shah, Shreeraj.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston : Addison-Wesley, c2003Availability: Items available for loan: [Call number: 005.8 MCC] (1).
10. Network security essentials : applications and standards / William Stallings.

by Stallings, William.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi : Pearson Education, c2011[reprinted 2013]Availability: Items available for reference: [Call number: 005.8 STA] (1). Checked out (1).
11. Fundamentals network security / Eric Maiwld

by Maiwald, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi : McGraw Hill, c2004.[Reprinted 2010, 2013]Availability: Items available for loan: [Call number: 005.8 MAI] (1). Items available for reference: [Call number: 005.8 MAI] (1).
12. Auditing cloud computing : a security and privacy guide / [edited by] Ben Halpert.

by Halpert, Ben, 1986-.

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, N.J. : John Wiley & Sons, ©2011Online access: Wiley Online Library Availability: No items available
13. Cyber conflict : competing national perspectives / edited by Daniel Ventre.

by Ventre, Daniel.

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: London : Hoboken, NJ : ISTE ; John Wiley & Sons, 2012Online access: Wiley Online Library Availability: No items available
14. Cybercrime and cyberwarfare / Igor Bernik.

by Bernik, Igor [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: London, UK : Hoboken, NJ : ISTE Ltd ; John Wiley & Sons, Inc., 2014Copyright date: ©2014Online access: Wiley Online Library Availability: No items available
15. Cybersecurity for executives : a practical guide / by Gregory J. Touhill and C. Joseph Touhill.

by Touhill, Gregory J | Touhill, C. J, 1938-.

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, New Jersey : John Wiley & Sons, [2014]Online access: Wiley Online Library Availability: No items available
16. Network Security / André Perez.

by Perez, Andre.

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: London : Hoboken, NJ : ISTE ; Wiley, 2014Online access: Wiley Online Library Availability: No items available
17. Understanding Bitcoin : Cryptography, Engineering and Economics / Pedro Franco.

by Franco, Pedro [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Chichester, West Sussex : Wiley, 2015Online access: Wiley Online Library Availability: No items available
18. Security intelligence : a practitioner's guide to solving enterprise security challenges / Qing Li, Gregory Clark.

by Li, Qing, 1971- [author.] | Clark, Gregory [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, 2015Online access: Wiley Online Library Availability: No items available
19. Beyond cybersecurity : protecting your digital business / James M. Kaplan, Tucker Bailey, Chris Rezek, Derek O'Halloran, Alan Marcus.

by Kaplan, James M [author.] | Bailey, Tucker [author.] | Rezek, Chris [author.] | O'Halloran, Derek [author.] | Marcus, Alan [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, New Jersey : Wiley, 2015Online access: Wiley Online Library Availability: No items available
20. Introduction to network security : theory and practice / Jie Wang, Department of Computer Science at the University of Massachusetts Lowell and Zachary A. Kissel, Department of Computer Science at Merrimack College in North Andover, MA.

by Wang, Jie, 1961- | Kissel, Zachary A.

Edition: Second edition.Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, NJ : Singapore : Wiley ; HEP, 2015Online access: Wiley Online Library Availability: No items available
21. Network attacks and exploitation : a framework / Matthew Monte.

by Monte, Matthew [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, 2015Copyright date: ©2015Other title: Network attacks & exploitation.Online access: Wiley Online Library Availability: No items available
22. The network security test lab : a step-by-step guide / Michael Gregg.

by Gregg, Michael (Michael C.) [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, [2015]Copyright date: ©2015Online access: Wiley Online Library Availability: No items available
23. The antivirus hacker's handbook / Joxean Koret, Elias Bachaalany.

by Koret, Joxean [author.] | Bachaalany, Elias [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : John Wiley & Sons, Inc., [2015]Copyright date: ©2015Online access: Wiley Online Library Availability: No items available
24. Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs.

by Jacobs, Stuart [author.].

Edition: Second edition.Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Piscataway, NJ : Hoboken, N.J. : IEEE Press ; Wiley, [2016]Copyright date: ©2016Online access: Wiley Online Library Availability: No items available
25. Distributed networks : intelligence, security, and applications / edited by Qurban A. Memon.

by Memon, Qurban Ali [editor.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : Taylor & Francis, 2014Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
26. Handbook of financial cryptography and security [electronic resource] / editor, Burton Rosenberg.

by Rosenberg, Burton.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boca Raton : Chapman & Hall/CRC, 2010Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
27. Network anomaly detection : a machine learning perspective / Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita.

by Bhattacharyya, Dhruba K [author.] | Kalita, Jugal Kumar [author].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, [2014]Copyright date: �201Online access: Distributed by publisher. Purchase or institutional license may be required for access Availability: No items available
28. Managing trust in cyberspace / edited by Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey.

by Thampi, Sabu M [editor of compilation] | Bhargava, Bharat K, 1948- [editor of compilation] | Atrey, Pradeep [editor of compilation].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : Taylor & Francis, [2014]Copyright date: �201Online access: Distributed by publisher. Purchase or institutional license may be required for access Availability: No items available
29. Honeypot [electronic resource] : a new paradigm to information security / R.C. Joshi, Anjali Sardana.

by Joshi, R. C | Sardana, Anjali.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Enfield, N.H. : Science Publishers, 2011Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
30. Enhancing computer security with smart technology [electronic resource] / editor, V. Rao Vemuri.

by Vemuri, V. Rao.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boca Raton, FL : Auerbach Publications, 2006Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
31. Iris biometric model for secured network access [electronic resource] / Franjieh El Khoury.

by Khoury, Franjieh El.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2013Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
32. Security and policy driven computing [electronic resource] / Lei Liu.

by Liu, Lei, 1968-.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boca Raton, Fla. : CRC Press, c2011Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
33. Data mining tools for malware detection [electronic resource] / Mehedy Masud, Latifur Khan and Bhavani Thuraisingham.

by Masud, Mehedy | Khan, Latifur | Thuraisingham, Bhavani M.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boca Raton, Fla. : CRC Press, 2012Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
34. What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco.

by DeFranco, Joanna F [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, [2014]Copyright date: �201Other title: Cyber security and digital forensics.Online access: Distributed by publisher. Purchase or institutional license may be required for access Availability: No items available
35. What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco.

by DeFranco, Joanna F [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, [2014]Copyright date: �201Other title: Cyber security and digital forensics.Online access: Distributed by publisher. Purchase or institutional license may be required for access Availability: No items available
36. Automatic defense against zero-day polymorphic worms in communication networks [electronic resource] / Mohssen Mohammed, Al-Sakib Khan Pathan.

by Mohammed, Mohssen, 1982- | Pathan, Al-Sakib Khan.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boca Raton, Fla. : CRC Press, 2013Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available

Khulna University of Engineering & Technology

Funded by: HEQEP, UGC, Bangladesh