Refine your search


You are not logged in Show Basket
  Home     Advanced Search     Back  
Catalogue Search Results

You searched: |  Subject = Computer security,  | 
Results: 106 found in 0.013 seconds

 
Title
Author
Publisher Edition
Shelf
At
0
Cryptography & security over network /
Near East University, 2006 QA76.9.A25 M37 2006 Storage -
Ask reception
2
Virtual honeypots :
from botnet tracking to intrusion detection /
ISBN: 0321336321
Addison-Wesley, 2008. QA76.9.A25 P785 2008 1 - On loan
-
2
Security power tools /
ISBN: 0596009631
O'Reilly, 2007. TK5105.77 .B87 2007 1 - On loan
-
7
Code hacking :
a developer's guide to network security /
ISBN: 1584503149
Charles River Media, 2004. TK5105.59 .C5795 2004 Storage NEU Grand Library[General Collection] (4)
Storage (1)
University of Kyrenia Grand Library[General Collection] (1)
Ask reception
2
Hardening Linux /
ISBN: 1590594444
Apress ; c2005. QA76.76.D49 T87 2005 1 - On loan
-
0
IET information security
Institution of Engineering and Technology, c2007- QA76.9.A25 I345 Online electronic
Not for loan
0
ACM transactions on information and system security
Association for Computing Machinery, c1998- QA76.9.A25 A344 Online electronic
Not for loan
0
Journal of computer security
IOS Press QA76.9.A25 Online electronic
Not for loan
0
International journal of information security
Springer-Verlag, 2001- QA76.9.A25 J68 Online electronic
Not for loan
0
Information systems security
CRC Press ISSN RECORD Online electronic
Not for loan
Quick search
Term:
Full phrase Any word

<<

<

7

8

9

10

11

>

>>

Results 61 - 70 of 106 records.
New search | Back to the last search


NEAR EAST UNIVERSITY GRAND LIBRARY +90 (392) 223 64 64 Ext:5536. Near East Boulevard, Nicosia, TRNC
This software is developed by NEU Library and it is based on Koha OSS
conforms to MARC21 library data transfer rules.