Refine your search


You are not logged in Show Basket
  Home     Advanced Search     Back  
Catalogue Search Results

You searched: |  Subject = Computer security,  | 
Results: 106 found in 0.006 seconds

 
Title
Author
Publisher Edition
Shelf
At
0
A brief history of cryptology /
ISBN: 1591140846
Naval Institute Press, 2005. TK5102.85 .B66 2005 NEU Grand Library[General Collection]
Available
0
Embedded cryptographic hardware :
methodologies and architectures /
ISBN: 1594540128
Nova Science Publishers, c2004. TK5102.94 .E49 2004 NEU Grand Library[General Collection]
Available
0
Firewalls and trusted systems /
Near East University, 2003. TK5105.59 .B35 2003 Storage -
Ask reception
0
Eleventh hour CISSP :
study guide /
ISBN: 9781597495660
Syngress, 2011. TK5105.59 .C579185 2011 NEU Grand Library[General Collection]
Available
7
Code hacking :
a developer's guide to network security /
ISBN: 1584503149
Charles River Media, 2004. TK5105.59 .C5795 2004 Storage NEU Grand Library[General Collection] (4)
Storage (1)
University of Kyrenia Grand Library[General Collection] (1)
Ask reception
1
Protect yourself online /
ISBN: 0735611882
Microsoft Press, 2001. TK5105.59 .D36 2001 NEU Grand Library[General Collection]
Available
1
Check Point FireWall-1 :
administration guide /
ISBN: 007134229X (set)
McGraw-Hill, c2000. TK5105.59 .G6497 1999 -
-
2
Check Point Fire Wall
administration guide /
ISBN: 007134229x
McGraw-Hill, 2000. TK5105.59 .G6497 2000 NEU Grand Library[General Collection] (2)
Available
0
Firewalls and network security /
Near East University, 2003. TK5105.59 .G83 2003 Storage -
Ask reception
0
Firewalls network security /
Near East University, 2004 TK5105.59 M38 2004 Storage -
Ask reception
Quick search
Term:
Full phrase Any word

<<

<

9

10

11

>

>>

Results 81 - 90 of 106 records.
New search | Back to the last search


NEAR EAST UNIVERSITY GRAND LIBRARY +90 (392) 223 64 64 Ext:5536. Near East Boulevard, Nicosia, TRNC
This software is developed by NEU Library and it is based on Koha OSS
conforms to MARC21 library data transfer rules.