Your search returned 15 results.

Not what you expected? Check for suggestions
1.
The antivirus hacker's handbook / Joxean Koret, Elias Bachaalany.

by Koret, Joxean [author.] | Bachaalany, Elias [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : John Wiley & Sons, Inc., [2015]Copyright date: ©2015Online access: Wiley Online Library Availability: No items available :
2.
Auditing cloud computing : a security and privacy guide / [edited by] Ben Halpert.

by Halpert, Ben, 1986-.

Series: Wiley corporate F & A ; 21.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: Hoboken, N.J. : John Wiley & Sons, ©2011Online access: Wiley Online Library Availability: No items available :
3.
Beyond cybersecurity : protecting your digital business / James M. Kaplan, Tucker Bailey, Chris Rezek, Derek O'Halloran, Alan Marcus.

by Kaplan, James M [author.] | Bailey, Tucker [author.] | Rezek, Chris [author.] | O'Halloran, Derek [author.] | Marcus, Alan [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, New Jersey : Wiley, 2015Online access: Wiley Online Library Availability: No items available :
4.
Cyber conflict : competing national perspectives / edited by Daniel Ventre.

by Ventre, Daniel.

Series: ISTEMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: London : Hoboken, NJ : ISTE ; John Wiley & Sons, 2012Online access: Wiley Online Library Availability: No items available :
5.
Cybercrime and cyberwarfare / Igor Bernik.

by Bernik, Igor [author.].

Series: Focus seriesMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: London, UK : Hoboken, NJ : ISTE Ltd ; John Wiley & Sons, Inc., 2014Copyright date: ©2014Online access: Wiley Online Library Availability: No items available :
6.
Cybersecurity for executives : a practical guide / by Gregory J. Touhill and C. Joseph Touhill.

by Touhill, Gregory J | Touhill, C. J, 1938-.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, New Jersey : John Wiley & Sons, [2014]Online access: Wiley Online Library Availability: No items available :
7.
Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs.

by Jacobs, Stuart [author.].

Series: IEEE Press series on information & communication networks securityEdition: Second edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Piscataway, NJ : Hoboken, N.J. : IEEE Press ; Wiley, [2016]Copyright date: ©2016Online access: Wiley Online Library Availability: No items available :
8.
Introduction to network security : theory and practice / Jie Wang, Department of Computer Science at the University of Massachusetts Lowell and Zachary A. Kissel, Department of Computer Science at Merrimack College in North Andover, MA.

by Wang, Jie, 1961- | Kissel, Zachary A.

Edition: Second edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, NJ : Singapore : Wiley ; HEP, 2015Online access: Wiley Online Library Availability: No items available :
9.
Life after Google : the fall of big data and the rise of the blockchain economy / George Gilder.

by Gilder, George F, 1939- [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publication details: Washington, DC : Regnery Gateway, an imprint of Regnery Publishing, [2018]Other title: Fall of big data and the rise of the blockchain economy.Availability: Items available for reference: Not For LoanCall number: 338.4760979473 G468l 2018 (1). :
10.
Network attacks and exploitation : a framework / Matthew Monte.

by Monte, Matthew [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, 2015Copyright date: ©2015Other title: Network attacks & exploitation.Online access: Wiley Online Library Availability: No items available :
11.
Network Security / André Perez.

by Perez, Andre.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: London : Hoboken, NJ : ISTE ; Wiley, 2014Online access: Wiley Online Library Availability: No items available :
12.
The network security test lab : a step-by-step guide / Michael Gregg.

by Gregg, Michael (Michael C.) [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, [2015]Copyright date: ©2015Online access: Wiley Online Library Availability: No items available :
13.
Security intelligence : a practitioner's guide to solving enterprise security challenges / Qing Li, Gregory Clark.

by Li, Qing, 1971- [author.] | Clark, Gregory [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, 2015Online access: Wiley Online Library Availability: No items available :
14.
The state of the art in intrusion prevention and detection / edited by Al-Sakib Khan Pathan.

by Pathan, Al-Sakib Khan.

Material type: Text Text; Format: microfiche festschrift Publication details: New York : CRC Press, 2016Availability: Items available for reference: Not For LoanCall number: 005.8 S7971 2016 (1). :
15.
Understanding Bitcoin : Cryptography, Engineering and Economics / Pedro Franco.

by Franco, Pedro [author.].

Series: Wiley finance seriesMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: Chichester, West Sussex : Wiley, 2015Online access: Wiley Online Library Availability: No items available :

 

Last Updated November 15 2020
Copyright © IUB Library
Independent University, Bangladesh.
Library Home | About Library | Services | FAQS | Contact