My Library

   
Limit search to available items
Nearby Call numbers are:
Result Page   Prev Next  
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Media Year
QA76.87 .N497 2019 : Nguyen, Hung T.,     
      A first course in fuzzy logic / Hung T. Nguyen, Carol L. Walker, Elbert A. Walker. Male Library:Available   Text-Book 2019
QA76.87 .N497 2022 : Nguyen, Hung T.,     
      A first course in fuzzy logic / Hung T. Nguyen, Carol L. Walker, Elbert A. Walker. Female Library:Available   Text-Book 2022
QA76.87 .R35 2019 : Rajasekaran, Sundaramoorthy     
       Neural networks, fuzzy systems and evolutionary algorithms : synthesis and applications / S. Rajasekaran, G.A. Vijayalakshmi Pai. Male Library:Available, Female Library:Available   Text-Book 2019
QA76.87 R56 1996 : Ripley, Brian D     
      Pattern recognition and neural networks / B.D. Ripley. Female Library:Available   Book 1996
QA76.87 .S658 2017 : Smith, James E.     
      Space-time computing with temporal neural networks / James E Smith. Male Library:Available, Female Library:Available   Text-Book 2017
QA76.9.A25 A43 2012 : Alaziz, Hanaa Abd     
      Data hiding and applications: image watermaking and steganography/ Hanaa Abd Alaziz. Female Library:Available   Book 2012
QA76.9.A25 B356 2015 : Baloch, Rafay     
      Ethical hacking and penetration testing guide / Rafay Baloch. Male Library:Available, Female Library:Available   Text-Book 2015
QA76.9.A25 B36 2001 : بانكس ، مايكل     
      أمن الكمبيوتر / تأليف مايكل بانكس ؛ ترجمة مركز التعريب و البرمجة. Male Library:DUE 04-17-04 11:59PM Billed, Male Library:Available, Female Library:Available   Book 2001
QA76.9.A25 B56 2003 : Bishop, Matt     
      Computer security : art and science / Matt Bishop. Male Library:Available   Book 2003
QA76.9.A25 B563 2005 : Bishop, Matt     
      Introduction to computer security / Matt Bishop. Female Library:Available   Book 2005
QA76.9.A25 B565 2003 : Bishop, David,     
      Introduction to cryptography with Java applets / David Bishop. Female Library:Available   Book 2003
QA76.9.A25 B7747 2017 : Brotherston, Lee     
      Defensive security handbook : best practices for securing infrastructure / Lee Brotherston and Amanda Berlin. Female Library:Available, Male Library:Available   Book 2017
QA76.9.A25 B79 2005 : Bruen, Aiden A.,     
      Cryptographiy,information theory,and error-correction : a handbook for 21st century / Aiden A. Bruen, Mario A. Forcinito. Female Library:Available   Book 2005
QA76.9.A25 B834 2017 : Buchanan, William     
      Cryptography / William J. Buchanan. Male Library:Available, Female Library:Available   Text-Book 2017
QA76.9.A25 C35 2009 : Ciampa, Mark     
      Security+ guide to network security fundamentals / Mark Ciampa. Female Library:Available   Book 2009
QA76.9.A25 C426 2015      
      Case studies in secure computing : achievements and trends / edited by Biju Issac and Nauman Israr. Male Library:Available, Female Library:Available   Text-Book 2015
QA76.9.A25 C435 2005 : Solomon, Michael,     
      Information security illuminated / Michael Solomon and Mike Chapple. Female Library:Available   Book 2005
QA76.9.A25 C53 2017 : Ciampa, Mark     
      Security awareness : applying practical security in your world / Mark Ciampa. Female Library:Available   Book 2017
QA76.9.A25 C9183 2014      
      Cyber security and IT infrastructure protection / edited by John R. Vacca. Female Library:Available, Male Library:Available   Book 2014
QA76.9.A25 C934 2017      
      Cybersecurity and privacy - bridging the gap / editors Samant Khajuria, Lene Sørensen, Knud Erik Skouby. Male Library:Available, Female Library:Available   Text-Book 2017
QA76.9.A25 C957 2015      
      Cybersecurity : protecting critical infrastructures from cyber attack and cyber warfare / edited by Thomas A. Johnson. Male Library:Available, Female Library:Available   Text-Book 2015
QA76.9.A25 D29 2004 : داود ، حسن طاهر     
      أمن شبكات المعلومات / تأليف حسن طاهر داود. Male Library:Available   Book 2004
QA76.9A25 D33 2002 : Dangerfield, Steven     
      Check point fire wall - 1 administration and CCSA study guide / Steven Dangerfield. Female Library:Available   Book 2002
QA76.9.A25 E27 2006 : Easttom, Chuck     
      Computer security fundamentals / Chuck Easttom. Female Library:Available   Book 2006
QA76.9.A25 E5443 2013 : Engebretson, Patrick     
      The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / Patrick Engebretson, David Kennedy, Technical Editor. Female Library:Available   Book 2013
QA76.9.A25 G535 2015 : Glaser, J. D.     
      Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScript / J. D. Glaser ; foreword by Jeremiah Grossman. Male Library:Available, Female Library:Available   Text-Book 2015
QA76.9.A25 G65 2006 : Gollmann, Dieter     
      Computer security / Dieter Gollmann. Female Library:Available   Book 2006
QA76.9.A25 G7497 2015 : Gregory, Peter H     
      CISSP guide to security essentials / Peter H. Gregory. Female Library:Available   Book 2015
QA76.9.A25 I541 2004      
      Information security management handbook / edited by Harold F. Tipton, Micki Krause. Female Library:Available   Book 2004
QA76.9.A25 K 86 2012 : Kumar, Neeraj     
      Comparative analysis of different digital image watermarking techniques: Forsecured data transmission/ Neeraj Kumar, Ajay Rana. Female Library:Available, Male Library:Available   Book 2012
QA76.9.A25 K345 2002 : Kaufman, Charlie     
      Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner. Male Library:Available   Book
QA76.9.A25 L23 2013      
      Laboratory manual to accompany fundamentals of information systems security / Edito-in-Chief Michael Johnson; High stakes writing Katherine Dillin. Female Library:Available   Book 2013
QA76.9.A25 M35 2006      
      Machine learning and data mining for computer security : methods and applications / Marcus A. Maloof. Female Library:Available   Book 2006
QA76.9.A25 M36 2017 : McMillan, Troy     
      CompTIA cybersecurity analyst (CSA+) cert guide / Troy McMillan. Female Library:Available, Male Library:Available   Book 2017
QA76.9.A25 M39 2001      
      Maximum security : a hacker's guide to protecting your Internet site and network / Anonymous.   Book 2001
QA76.9.A25 M44 2001 : Mel, H. X.     
      Cryptography decrypted / H.X. Mel,Doris Baker ; mth ap appendix by Steve Burnett ; foreword by John Kinyon. Female Library:Available   Book 2001
QA76.9.A25 M485 2006 : Merkow, Mark S     
      Information security : principles and practices / Mark S. Merkow, Jim Breithaupt. Female Library:Available   Book 2006
QA76.9.A25 N45 2006 : Nelson, Bill     
      Guide to computer forensics and investigations / Bill Nelson ... [et al.]. Female Library:Available   Book 2006
QA76.9.A25 P36 2010 : Panko, R. R     
      Corporate computer and network security / Raymond R. Panko. Female Library:Available   Book 2010
QA76.9.A25 P43 2012 : Phadikar,Amit     
      Color image watermarking using MATLAB : A review and design of robust watermarking techniques/ Amit Phadikar. Female Library:Available, Male Library:Available   Book 2012
QA76.9.A25 P45 2015 : Pfleeger, Charles P. ,     
      Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies. Female Library:Available   Book 2015
QA76.9.A25 P536 2003 : Pieprzyk, Josef     
      Fundamentals of computer security / Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry. Female Library:Available   Book 2003
QA76.9.A25 P75 2004      
      Principles of computer security : Security+ and beyond / Wm. Arthur Conklin... [et al.]. Female Library:Available   Book 2004
QA76.9.A25 R463 2013 : Rhodes-Ousley, Mark     
      Information security : the complete reference / Mark Rhodes-Ousley. Female Library:Available, Male Library:Available   Book 2013
QA76.9.A25 S39 2002      
      Security complete.   Book 2002
QA76.9.A25 S493 2016 : Shoemaker, Dan     
      A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0) / Dan Shoemaker, Anne Kohnke, Ken Sigler. Male Library:Available, Female Library:Available   Text-Book 2016
QA76.9.A25 S55 2017 : Simpson, Michael T.,     
      Hands-on ethical hacking and network defense / Michael T. Simpson, Nicholas D. Antill. Female Library:Available, Male Library:Available, Special Collection:Available   Book 2017
QA76.9.A25 S55 2021 : Simpson, Michael T.,     
      Hands-on ethical hacking and network defense / Michael T. Simpson, Nicholas Antill, Robert S. Wilson. Male Library:DUE 10-05-23 Billed, Female Library:Available   Book 2021
QA76.9.A25 S56 2012 : Shoemaker, Dan     
      Cybersecurity : the essential body of knowledge / Dan Shoemaker , Wm. Arthur Conklin. Male Library:Available, Female Library:Available   Book 2012
QA76.9.A25 S65 2002 : Smith, Richard E.     
      Authentication : from passwords to public keys / Richard E. Smith.   Book 2002
Add Marked to Bag Add All On Page Add Marked to My Lists
Resources
More Information
Result Page   Prev Next