Your search returned 15 results.

Not what you expected? Check for suggestions
Sort
Results
1.
The antivirus hacker's handbook / Joxean Koret, Elias Bachaalany. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, IN : John Wiley & Sons, Inc., [2015]Copyright date: ©2015
Online access:
Availability: No items available.
2.
Auditing cloud computing : a security and privacy guide / [edited by] Ben Halpert. by Series: Wiley corporate F & A ; 21.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Hoboken, N.J. : John Wiley & Sons, ©2011
Online access:
Availability: No items available.
3.
4.
Cyber conflict : competing national perspectives / edited by Daniel Ventre. by Series: ISTE
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: London : Hoboken, NJ : ISTE ; John Wiley & Sons, 2012
Online access:
Availability: No items available.
5.
Cybercrime and cyberwarfare / Igor Bernik. by Series: Focus series
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: London, UK : Hoboken, NJ : ISTE Ltd ; John Wiley & Sons, Inc., 2014Copyright date: ©2014
Online access:
Availability: No items available.
6.
Cybersecurity for executives : a practical guide / by Gregory J. Touhill and C. Joseph Touhill. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Hoboken, New Jersey : John Wiley & Sons, [2014]
Online access:
Availability: No items available.
7.
Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs. by Series: IEEE Press series on information & communication networks security
Edition: Second edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Piscataway, NJ : Hoboken, N.J. : IEEE Press ; Wiley, [2016]Copyright date: ©2016
Online access:
Availability: No items available.
8.
Introduction to network security : theory and practice / Jie Wang, Department of Computer Science at the University of Massachusetts Lowell and Zachary A. Kissel, Department of Computer Science at Merrimack College in North Andover, MA. by
Edition: Second edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Hoboken, NJ : Singapore : Wiley ; HEP, 2015
Online access:
Availability: No items available.
9.
Life after Google : the fall of big data and the rise of the blockchain economy / George Gilder. by
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General;
Publication details: Washington, DC : Regnery Gateway, an imprint of Regnery Publishing, [2018]
Other title:
  • Fall of big data and the rise of the blockchain economy
Availability: Items available for reference: Library, Independent University, Bangladesh (IUB): Not For Loan (1)Location, call number: Reference Stacks 338.4760979473 G468l 2018.
10.
Network attacks and exploitation : a framework / Matthew Monte. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, 2015Copyright date: ©2015
Other title:
  • Network attacks & exploitation
Online access:
Availability: No items available.
11.
Network Security / André Perez. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: London : Hoboken, NJ : ISTE ; Wiley, 2014
Online access:
Availability: No items available.
12.
The network security test lab : a step-by-step guide / Michael Gregg. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, [2015]Copyright date: ©2015
Online access:
Availability: No items available.
13.
Security intelligence : a practitioner's guide to solving enterprise security challenges / Qing Li, Gregory Clark. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, 2015
Online access:
Availability: No items available.
14.
The state of the art in intrusion prevention and detection / edited by Al-Sakib Khan Pathan. by
Material type: Text Text; Format: microfiche festschrift
Publication details: New York : CRC Press, 2016
Availability: Items available for reference: Library, Independent University, Bangladesh (IUB): Not For Loan (1)Location, call number: Reference Stacks 005.8 S7971 2016.
15.
Understanding Bitcoin : Cryptography, Engineering and Economics / Pedro Franco. by Series: Wiley finance series
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Chichester, West Sussex : Wiley, 2015
Online access:
Availability: No items available.
Pages