IT Security, data Security
⇐ Back to Main SubjectsRelated Subjects
Sort results by:
Showing 121 - 130 of total 161 results.- 121CISCO FIREPOWER THREAT DEFENSE (FTD)
Author(s): NAZMUL RAJIB
Publisher: CISCO PRESS (Publication Year:2018)
Subject(s): COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 RAJ
Accession No: 96833 - 122CCNA SECURITY 640-554 OFFICIAL CERT GUIDE
Author(s): KEITH BARKER, SCOTT MORRIS
Publisher: CISCO PRESS (Publication Year:2013)
Subject(s): ELECTRONIC DATA PROCESSING, COMPUTER CERTIFICATION, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 BAR
Accession No: 85881 - 123CCNP SECURITY VPN 642-648 OFFICIAL CERT GUIDE
Author(s): HOWARD HOOPER
Publisher: CISCO PRESS (Publication Year:2013)
Subject(s): TELECOMUNICATIONS, COMPUTER CERTIFICATION, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 HOO
Accession No: 89023 - 124CCNA ROUTING AND SWITCHING ICND2 200-105: OFFICIAL CERT GUIDE LIBRARY ( WITH DVD)
Author(s): WENDELL ODOM
Publisher: CISCO PRESS (Publication Year:2017)
Subject(s): COMPUTER NETWORKS, ELECTRONIC DATA PROCESSING, INTERNETWORKING (TELECOMMUNICATION)
Call No: 005.8 ODO
Accession No: 93614 - 125CCNA ROUTING AND SWITCHING ICND1 100-105: OFFICIAL CERT GUIDE LIBRARY (WITH DVD)
Author(s): WENDELL ODOM
Publisher: CISCO PRESS (Publication Year:2016)
Subject(s): COMPUTER NETWORKS, ELECTRONIC DATA PROCESSING, INTERNETWORKING (TELECOMMUNICATION)
Call No: 005.8 ODO
Accession No: 93613 - 126HARDENING APACHE
Author(s): TONY MOBILY
Publisher: APRESS (Publication Year:2004)
Subject(s): COMPUTER SECURITY, WEB SERVERS COMPUTER PROGRAMS, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 MOB
Accession No: 80735 - 127NETWORK SECURITY: A HACKER'S PERSPECTIVE
Author(s): ANKIT FADIA
Publisher: COURSE TECHNOLOGY - THOMSON LEARNING (Publication Year:2002)
Subject(s): NETWORK SECURITY, COMPUTER NETWORKS SECURITY MEASURES
Call No: 005.8 FAD
Accession No: 72941 - 128SERIOUS CRYPTOGRAPHY: A PRACTICAL INTRODUCTION TO MODERN ENCRYPTION
Author(s): JEAN-PHILIPPE AUMASSON
Publisher: NO STARCH PRESS (Publication Year:2018)
Subject(s): COMPUTER SECURITY, DATA ENCRYPTION (COMPUTER SCIENCE)
Call No: 005.8 AUM
Accession No: 97017 - 129THE BASICS OF HACKING AND PENETRATION TESTING: ETHICAL HACKING AND PENETRATION TESTING MADE EASY
Author(s): PATRICK ENGEBRETSON
Publisher: SYNGRESS (Publication Year:2011)
Subject(s): COMPUTER CRIMES, COMPUTER SOFTWARE, COMPUTER SECURITY, PREVENTION, COMPUTER HACKERS
Call No: 005.8 ENG
Accession No: 86393 - 130CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT(AN ISACA CERTIFICATION) :CGEIT REVIEW MANUAL 2010
Publisher: INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA) (Publication Year:2010)
Subject(s): AUDITING, ENTERPRISE, INFORMATION TECHNOLOGY, GOVERNANCE, INFORMATION TECHNOLOGY AUDIT
Call No: 005.8 INF
Accession No: 81230