Your search returned 26 results.

Not what you expected? Check for suggestions
Sort
Results
1.
The antivirus hacker's handbook / Joxean Koret, Elias Bachaalany. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, IN : John Wiley & Sons, Inc., [2015]Copyright date: ©2015
Online access:
Availability: No items available.
2.
Auditor's guide to IT auditing / Richard E. Cascarino. by Series: Wiley corporate F & A
Edition: 2nd ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley, ©2012
Online access:
Availability: No items available.
3.
4.
Building Internet Firewalls / Elizabeth D., Zwicky by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General;
Publication details: Mumbai : Shroff Publishers and Distributors Pvt.Ltd., 2000
Availability: Items available for loan: Library, Independent University, Bangladesh (IUB) (1)Location, call number: General Stacks 004.678 Z98b.
5.
Cloud management and security / Imad M. Abbadi. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Chichester, West Sussex ; Hoboken, NJ : John Wiley & Sons Inc., 2014
Online access:
Availability: No items available.
6.
Computer security handbook / edited by Seymour Bosworth, Michel E. Kabay, Eric Whyne. by
Edition: Sixth edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Hoboken, New Jersey : Wiley, [2014]
Online access:
Availability: No items available.
7.
Cyber security policy guidebook / Jennifer L. Bayuk [and others]. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher number:
  • EB00063197 Recorded Books
Publication details: Hoboken, N.J. : Wiley, ©2012
Online access:
Availability: No items available.
8.
Database and Applications Security : integrating information security and data management / Bhavani Thuraisingham by
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General;
Publication details: Boca Raton : Auerbach Publications, 2005
Availability: Items available for reference: Library, Independent University, Bangladesh (IUB): Not For Loan (1)Location, call number: Reference Stacks 005.8 T536d.
9.
Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs. by Series: IEEE Press series on information & communication networks security
Edition: Second edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Piscataway, NJ : Hoboken, N.J. : IEEE Press ; Wiley, [2016]Copyright date: ©2016
Online access:
Availability: No items available.
10.
Firewall Architecture for the Enterprise / Norbert, Pohlmann by
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General;
Publication details: New Delhi : Firewall Media, 2002003
Availability: Items available for reference: Library, Independent University, Bangladesh (IUB): Not For Loan (1)Location, call number: Reserve Shelf 005.8 P748f.
11.
Firewall Systems / Norbert Pohlmann by
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General;
Publication details: Germany : Verlag Moderne Industrie, 2001
Availability: Items available for reference: Library, Independent University, Bangladesh (IUB): Not For Loan (1)Location, call number: Reserve Shelf 005.8 P748f.
12.
Healthcare fraud : auditing and detection guide / Rebecca Saltiel Busch. by
Edition: 2nd ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Hoboken, N.J. : John Wiley & Sons, ©2012
Online access:
Availability: No items available.
13.
Information security : principles and practice / Mark Stamp. by
Edition: 2nd ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley, �2011
Online access:
Availability: No items available.
14.
Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and business / Erik Laykin, CHFI, CEDS. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher number:
  • EB00063096 Recorded Books
Publisher: Hoboken : John Wiley, 2013
Online access:
Availability: No items available.
15.
LAN Security Handbook
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General;
Publication details: New Delhi : BPB Publications, 1995
Availability: Items available for loan: Library, Independent University, Bangladesh (IUB) (1)Location, call number: General Stacks 006.6 L243.
16.
Network attacks and exploitation : a framework / Matthew Monte. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, 2015Copyright date: ©2015
Other title:
  • Network attacks & exploitation
Online access:
Availability: No items available.
17.
The network security test lab : a step-by-step guide / Michael Gregg. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, [2015]Copyright date: ©2015
Online access:
Availability: No items available.
18.
NT Network Security / Matthew, Strebe by
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General;
Publication details: New Delhi : BPB Publications, 1998
Availability: Items available for loan: Library, Independent University, Bangladesh (IUB) (2)Location, call number: General Stacks 004.6 S914n, ...
19.
Payment technologies for E-commerce / edited by Weidong Kou. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, 2003
Online access:
Availability: Items available for loan: Library, Independent University, Bangladesh (IUB) (1)Location, call number: 005.8 P344 2003.
20.
21.
Reliability and availability of cloud computing / Eric Bauer, Randee Adams. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Hoboken, N.J. : Wiley-IEEE Press, 2012
Online access:
Availability: No items available.
22.
Security analytics for the internet of everything / edited by Mohiuddin Ahmed, Abu S.S. M. Barkat Ullah, by
Material type: Text Text; Literary form: Not fiction
Publication details: New York: CRC Press, 2020
Availability: Items available for loan: Library, Independent University, Bangladesh (IUB) (1)Location, call number: General Stacks 004.678 S4466 2020.
23.
Security intelligence : a practitioner's guide to solving enterprise security challenges / Qing Li, Gregory Clark. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, 2015
Online access:
Availability: No items available.
24.
Solaris Security / Peter H. Gregory by
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General;
Publication details: India : Pearson Education Asia, 2000
Availability: Items available for loan: Library, Independent University, Bangladesh (IUB) (1)Location, call number: General Stacks 005.62 G822s.
25.
The state of the art in intrusion prevention and detection / edited by Al-Sakib Khan Pathan. by
Material type: Text Text; Format: microfiche festschrift
Publication details: New York : CRC Press, 2016
Availability: Items available for reference: Library, Independent University, Bangladesh (IUB): Not For Loan (1)Location, call number: Reference Stacks 005.8 S7971 2016.
Pages