CENTRAL LIBRARY

Welcome to Online Public Access Catalogue (OPAC)

Your search returned 22 results. Subscribe to this search

|
1. Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner.

by Kaufman, Charlie | Perlman, Radia | Speciner, Michael.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Prentice Hall PTR, c2002.[Reprinted 2005]Availability: Items available for loan: [Call number: 005.8 KAU] (5).
2. Information security risk analysis / Thomas R. Peltier.

by Peltier, Thomas R.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Fiction Publisher: Boca Raton : Auerbach Publications, c2005Online access: Publisher description Availability: Items available for loan: [Call number: 005.8 PEL] (2).
3. Microsoft encyclopedia of security / Mitch Tulloch.

by Tulloch, Mitch.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Redmond, Wash. : New Delhi : Microsoft Press ; Prentice-Hall, c2003 [reprinted 2004]Online access: Contributor biographical information | Publisher description Availability: Items available for loan: [Call number: 005.803 TUL] (1).
4. Network security essentials : applications and standards / William Stallings.

by Stallings, William.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Pearson Education, c2007Online access: Table of contents only Availability: Items available for loan: [Call number: 005.8 STA] (2).
5. Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah.

by McClure, Stuart | Shah, Saumil | Shah, Shreeraj.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston : Addison-Wesley, c2003Availability: Items available for loan: [Call number: 005.8 MCC] (1).
6. Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah.

by McClure, Stuart | Shah, Saumil | Shah, Shreeraj.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston : Addison-Wesley, c2003Availability: Items available for loan: [Call number: 005.8 MCC] (1).
7. Network security essentials : applications and standards / William Stallings.

by Stallings, William.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi : Pearson Education, c2011[reprinted 2013]Availability: Items available for loan: [Call number: 005.8 STA] (1). Items available for reference: [Call number: 005.8 STA] (1).
8. Fundamentals network security / Eric Maiwld

by Maiwald, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi : McGraw Hill, c2004.[Reprinted 2010, 2013]Availability: Items available for loan: [Call number: 005.8 MAI] (1). Items available for reference: [Call number: 005.8 MAI] (1).
9. Understanding Bitcoin : Cryptography, Engineering and Economics / Pedro Franco.

by Franco, Pedro [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Chichester, West Sussex : Wiley, 2015Online access: Wiley Online Library Availability: No items available
10. Security intelligence : a practitioner's guide to solving enterprise security challenges / Qing Li, Gregory Clark.

by Li, Qing, 1971- [author.] | Clark, Gregory [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, 2015Online access: Wiley Online Library Availability: No items available
11. Beyond cybersecurity : protecting your digital business / James M. Kaplan, Tucker Bailey, Chris Rezek, Derek O'Halloran, Alan Marcus.

by Kaplan, James M [author.] | Bailey, Tucker [author.] | Rezek, Chris [author.] | O'Halloran, Derek [author.] | Marcus, Alan [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, New Jersey : Wiley, 2015Online access: Wiley Online Library Availability: No items available
12. Network attacks and exploitation : a framework / Matthew Monte.

by Monte, Matthew [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, 2015Copyright date: ©2015Other title: Network attacks & exploitation.Online access: Wiley Online Library Availability: No items available
13. The network security test lab : a step-by-step guide / Michael Gregg.

by Gregg, Michael (Michael C.) [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, [2015]Copyright date: ©2015Online access: Wiley Online Library Availability: No items available
14. The antivirus hacker's handbook / Joxean Koret, Elias Bachaalany.

by Koret, Joxean [author.] | Bachaalany, Elias [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : John Wiley & Sons, Inc., [2015]Copyright date: ©2015Online access: Wiley Online Library Availability: No items available
15. Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs.

by Jacobs, Stuart [author.].

Edition: Second edition.Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Piscataway, NJ : Hoboken, N.J. : IEEE Press ; Wiley, [2016]Copyright date: ©2016Online access: Wiley Online Library Availability: No items available
16. Network anomaly detection : a machine learning perspective / Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita.

by Bhattacharyya, Dhruba K [author.] | Kalita, Jugal Kumar [author].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, [2014]Copyright date: �201Online access: Distributed by publisher. Purchase or institutional license may be required for access Availability: No items available
17. Honeypot [electronic resource] : a new paradigm to information security / R.C. Joshi, Anjali Sardana.

by Joshi, R. C | Sardana, Anjali.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Enfield, N.H. : Science Publishers, 2011Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
18. Enhancing computer security with smart technology [electronic resource] / editor, V. Rao Vemuri.

by Vemuri, V. Rao.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boca Raton, FL : Auerbach Publications, 2006Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
19. Security and policy driven computing [electronic resource] / Lei Liu.

by Liu, Lei, 1968-.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boca Raton, Fla. : CRC Press, c2011Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
20. Data mining tools for malware detection [electronic resource] / Mehedy Masud, Latifur Khan and Bhavani Thuraisingham.

by Masud, Mehedy | Khan, Latifur | Thuraisingham, Bhavani M.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boca Raton, Fla. : CRC Press, 2012Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
21. What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco.

by DeFranco, Joanna F [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, [2014]Copyright date: �201Other title: Cyber security and digital forensics.Online access: Distributed by publisher. Purchase or institutional license may be required for access Availability: No items available
22. What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco.

by DeFranco, Joanna F [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, [2014]Copyright date: �201Other title: Cyber security and digital forensics.Online access: Distributed by publisher. Purchase or institutional license may be required for access Availability: No items available

Khulna University of Engineering & Technology

Funded by: HEQEP, UGC, Bangladesh