Shortcuts
Top of page (Alt+0)
Page content (Alt+9)
Page menu (Alt+8)
Your browser does not support javascript, some WebOpac functionallity will not be available.
.
Default
.
PageMenu
-
Main Menu
-
Member Services
.
Purchase Suggestion
.
Exit Webopac
.
Search Menu
Simple Search
.
Advanced Search
.
Clear Search Sets
.
Refine Search Results
.
.
FOS Childrens Library
.
New Items Search
.
Bottom Menu
Help
About
.
Map
.
Exit Webopac
.
Languages
English
.
German
.
New Items Menu
New Items Search
.
New Items List
.
.................................
EBOOK CENTRAL
.
SCIENCE DIRECT (BUSINESS)
.
MASADER
.
UNWTO
.
SCOPUS
.
E-JOURNALS
.
DATABASE INFO. SYSTEM (DBIS)
.
LIBRARY WEBSITE
.
© LIBERO v6.4.1sp211215
Page content
You are here
:
>
Library Layout
Search Results
Search Results
The titles shown in BOLD have items available, non bold titles do not have any items in stock
Refine Results
Author:
1
PANDEY ON
(2)
1
AHMED NASSER ALRIYAMI
(1)
2
CHAUDHARY VIKAS
(1)
3
CHIO CLARENCE
(1)
4
DAIMI KEVIN
(1)
Show more
Author
Year:
1
2022
(3)
1
2018
(2)
2
2020
(2)
1
2011
(1)
2
2017
(1)
Show more
Year
Subject:
1
COMPUTER SECURITY
(13)
1
COMPUTER NETWORKS SECURITY MEASURES
(2)
2
CRYPTOGRAPHY
(2)
3
INFORMATION SYSTEM SECURITY
(2)
4
NETWORK SECURITY
(2)
Show more
Subject
GMD:
1
Reference Book
(12)
1
E Book
(1)
Collection:
1
Applied Information Technology
(7)
1
Computer Science
(5)
1
IBSM and Logistics
(1)
Language:
1
English
(6)
Display results in table format.
-
Previous Shelf
Top
-
Concealing data in images using steganography techniques
Ahmed Nasser Alriyami
Call number
1
-
Title:
Concealing data in images using steganography techniques
Author:
Ahmed Nasser Alriyami
Year:
2023
Available at:
GUtech Library
.
-
Managing risk in information systems: Information system security & Assurance series
Gibson, Darryl
HD61.G53 2022
2
-
Title:
Managing risk in information systems: Information system security & Assurance series
Author:
Gibson, Darryl
Year:
2022
Available at:
GUtech Library
.
-
Cryptography and network security.
Chaudhary, Vikas
QA76.9.A25 C43 2020
3
-
Title:
Cryptography and network security.
Author:
Chaudhary, Vikas
Year:
2011
Available at:
GUtech Library
.
-
Machine learning and security: protecting systems with data and algorithms
Chio, Clarence
QA76.9.A25 C45 2018
4
-
Title:
Machine learning and security: protecting systems with data and algorithms
Author:
Chio, Clarence
Year:
2018
Available at:
GUtech Library
.
-
Computer and network security essentials
Daimi, Kevin...
QA76.9.A25 D35 2017
5
-
Title:
Computer and network security essentials
Author:
Daimi, Kevin...
Year:
2017
Available at:
GUtech Library
.
-
Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals.
Goutam, Rajesh Kumar
QA76.9.A25 G68 2021
6
-
Title:
Cybersecurity fundamentals. understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals.
Author:
Goutam, Rajesh Kumar
Year:
2021
No Items currently Available
.
-
Fundamentals of information systems security
Kim, David
QA76.9.A25 K56 2018
7
-
Title:
Fundamentals of information systems security
Author:
Kim, David
Year:
2018
Available at:
GUtech Library
.
-
Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
Oettinger, William
QA76.9.A25 O38 2022
8
-
Title:
Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
Author:
Oettinger, William
Year:
2022
Available at:
GUtech Library
.
-
Cyber security
Pandey, O.N.
QA76.9.A25 P36 2019
9
-
Title:
Cyber security
Author:
Pandey, O.N.
Year:
Available at:
GUtech Library
.
-
Network security
Pandey, O.N.
QA76.9.A25 P36 2020
10
-
Title:
Network security
Author:
Pandey, O.N.
Year:
2020
Available at:
GUtech Library
.
-
An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments
Gunawardana, Kushantha
QA76.9.M65 G86 2022
11
-
Title:
An ethical guide to cyber anonymity: concepts, tools, and techniques to be anonymous from criminals, unethical hackers, and governments
Author:
Gunawardana, Kushantha
Year:
2022
Available at:
GUtech Library
.
-
IT auditing: using controls to protect information assets
Kegerreis, M.
QC100.K44 2020
12
-
Title:
IT auditing: using controls to protect information assets
Author:
Kegerreis, M.
Year:
2020
Available at:
GUtech Library
.
-
Mastering Python Data Visualization.
Raman, Kirthi
13
-
Title:
Mastering Python Data Visualization.
Author:
Raman, Kirthi
Year:
Available at:
Ebook Central
.
-
Previous Shelf
Bottom