|
1.
|
Counter hack : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis.
by Skoudis, Ed. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c2002Availability: Items available for loan: University of Sargodha-Central Library [Call number: 004.65 SKC] (1).
|
|
2.
|
Security planning & disaster recovery / Eric Maiwald, William Sieglein.
by Maiwald, Eric | Sieglein, William. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : McGraw-Hill/Osborne, c2002Other title: Security planning and disaster recovery.Online access: Table of contents | Publisher description Availability: Items available for loan: University of Sargodha-Central Library [Call number: 005.8/MAS] (3).
|
|
3.
|
Enterprise security / Robert C. Newman.
by Newman, Robert C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River, N.J. : Prentice Hall, c2003Availability: Items available for loan: University of Sargodha-Central Library [Call number: 005.8 NEE] (1).
|
|
4.
|
Counter hack : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis.
by Skoudis, Ed. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c2002Availability: Items available for loan: University of Sargodha-Central Library [Call number: 005.8 SKC] (2).
|
|
5.
|
Who owns information? : from privacy to public access / Anne Wells Branscomb.
by Branscomb, Anne W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York, NY : BasicBooks, c1994Online access: Publisher description Availability: Items available for loan: University of Sargodha-Central Library [Call number: 342.73 BRA] (1).
|
|
6.
|
A practical guide to security assessments / Sudhanshu Kairab.
by Kairab, Sudhanshu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton, Fla. : Auerbach Publications, c2005Other title: Security assessments.Online access: Publisher description Availability: Items available for loan: University of Sargodha-Central Library [Call number: 658.47 KAA] (1).
|
|
7.
|
Privacy in the information age / Harry Henderson.
by Henderson, Harry, 1951-. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Facts On File, c1999Availability: Items available for loan: University of Sargodha-Central Library [Call number: 323.448 HEL] (1).
|
|
8.
|
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.
by Pfleeger, Charles P, 1948- | Pfleeger, Shari Lawrence. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River, NJ : Prentice Hall, c2007; New Delhi: Pearson, 2013Online access: Table of contents only Availability: Items available for loan: University of Sargodha-Central Library [Call number: 005.8 PLS] (1).
|
|
9.
|
Information security management handbook /
by Tipton, Harold F [ed.] | Krause, Micki [ed.]. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton, Fl : Auerbach, 2003Availability: Items available for loan: University of Sargodha-Central Library [Call number: 658.0558 INF] (1).
|