Shortcuts
LiberoBanner . Default .
PageMenu- Main Menu-
Page content
 

Search Results

Your Search for COMPUTER SECURITY returned 13 Items

Search Result Page: .   1   .   . Page: 1 of 1
The titles shown in BOLD have items available, non bold titles do not have any items in stock
Display results in shelf format.
Search Results
Result Thumbnail Title Author Year Flags Holding Information
1 An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments [Reference Book] Gunawardana, Kushantha 2022   Shelf Location: QA76.9.M65 G86 2022.
Available at: GUtech Library.
Number of Holdings: 1.
2 Computer and network security essentials Computer and network security essentials [Reference Book] Daimi, Kevin... 2017   Shelf Location: QA76.9.A25 D35 2017.
No Items currently Available.
Number of Holdings: 1.
3 Concealing data in images using steganography techniques [Reference Book] Ahmed Nasser Alriyami 2023   Shelf Location: Call number.
Available at: GUtech Library.
Number of Holdings: 1.
4 Cryptography and network security. Cryptography and network security. [Reference Book] Chaudhary, Vikas 2011   Shelf Location: QA76.9.A25 C43 2020.
Available at: GUtech Library.
Number of Holdings: 1.
5 Cyber security Cyber security [Reference Book] Pandey, O.N.     Shelf Location: QA76.9.A25 P36 2019.
Available at: GUtech Library.
Number of Holdings: 1.
6 Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals. Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals. [Reference Book] Goutam, Rajesh Kumar 2021   Shelf Location: QA76.9.A25 G68 2021.
No Items currently Available.
Number of Holdings: 1.
7 Fundamentals of information systems security Fundamentals of information systems security [Reference Book] Kim, David 2018   Shelf Location: QA76.9.A25 K56 2018.
Available at: GUtech Library.
Number of Holdings: 1.
8 IT auditing: using controls to protect information assets IT auditing: using controls to protect information assets [Reference Book] Kegerreis, M. 2020   Shelf Location: QC100.K44 2020.
Available at: GUtech Library.
Number of Holdings: 9.
9 Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence [Reference Book] Oettinger, William 2022   Shelf Location: QA76.9.A25 O38 2022.
Available at: GUtech Library.
Number of Holdings: 1.
10 Machine learning and security: protecting systems with data and algorithms Machine learning and security: protecting systems with data and algorithms [Reference Book] Chio, Clarence 2018   Shelf Location: QA76.9.A25 C45 2018.
No Items currently Available.
Number of Holdings: 1.
11 Managing risk in information systems: Information system security & Assurance series Managing risk in information systems: Information system security & Assurance series [Reference Book] Gibson, Darryl 2022   Shelf Location: HD61.G53 2022.
Available at: GUtech Library.
Number of Holdings: 1.
12 Mastering Python Data Visualization. Mastering Python Data Visualization. [E Book] Raman, Kirthi     Available at: Ebook Central.
Number of Holdings: 1.
13 Network security Network security [Reference Book] Pandey, O.N. 2020   Shelf Location: QA76.9.A25 P36 2020.
Available at: GUtech Library.
Number of Holdings: 1.
Search Result Page: .   1   .   . Page: 1 of 1
The titles shown in BOLD have items available, non bold titles do not have any items in stock