Your search returned 9 results. Subscribe to this search

|
1. Counter hack : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis.

by Skoudis, Ed.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c2002Availability: Items available for loan: University of Sargodha-Central Library [Call number: 004.65 SKC] (1).

2. Security planning & disaster recovery / Eric Maiwald, William Sieglein.

by Maiwald, Eric | Sieglein, William.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill/Osborne, c2002Other title: Security planning and disaster recovery.Online access: Table of contents | Publisher description Availability: Items available for loan: University of Sargodha-Central Library [Call number: 005.8/MAS] (3).

3. Enterprise security / Robert C. Newman.

by Newman, Robert C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, N.J. : Prentice Hall, c2003Availability: Items available for loan: University of Sargodha-Central Library [Call number: 005.8 NEE] (1).

4. Counter hack : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis.

by Skoudis, Ed.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c2002Availability: Items available for loan: University of Sargodha-Central Library [Call number: 005.8 SKC] (2).

5. Who owns information? : from privacy to public access / Anne Wells Branscomb.

by Branscomb, Anne W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York, NY : BasicBooks, c1994Online access: Publisher description Availability: Items available for loan: University of Sargodha-Central Library [Call number: 342.73 BRA] (1).

6. A practical guide to security assessments / Sudhanshu Kairab.

by Kairab, Sudhanshu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton, Fla. : Auerbach Publications, c2005Other title: Security assessments.Online access: Publisher description Availability: Items available for loan: University of Sargodha-Central Library [Call number: 658.47 KAA] (1).

7. Privacy in the information age / Harry Henderson.

by Henderson, Harry, 1951-.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Facts On File, c1999Availability: Items available for loan: University of Sargodha-Central Library [Call number: 323.448 HEL] (1).

8. Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P, 1948- | Pfleeger, Shari Lawrence.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Prentice Hall, c2007; New Delhi: Pearson, 2013Online access: Table of contents only Availability: Items available for loan: University of Sargodha-Central Library [Call number: 005.8 PLS] (1).

9. Information security management handbook /

by Tipton, Harold F [ed.] | Krause, Micki [ed.].

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton, Fl : Auerbach, 2003Availability: Items available for loan: University of Sargodha-Central Library [Call number: 658.0558 INF] (1).