TitlePublisherAuthorsSubjects
Guide to network defense and countermeasuresCourse Technology
PC magazine Windows Vista security solutionsWiley Pub.
Closeness centrality and epidemic spreading in networksAn-Najah National University
Writing secure code for Windows VistaMicrosoft
The Best of 2600 A Hacker OdysseyWiley Publishing
Professional ASP.NET 3.5 in C# and VBWiley
Cybersecurity : managing systems, conducting testing, and investigating intrusionsJohn Wiley & Sons
Information security and cyber lawsVikas Publishing house
Computer securityWiley
CISSP guide to security essentialsCourse Technology/Cengage Learning
2824B Implementing Microsoft Internet Security and Acceleration Server 2004Microsoft corporation
Infrastructure security, A total defense strategy: By Active/Passive attribute analysis and mediating technology synthesisAn-Najah National University
Infrastructure security, A total defense strategy: By Active/Passive attribute analysis and mediating technology synthesisAn-Najah National University
Cyber laws and It protectionPHI Learning
E-SecurityPacific Books International.
Information assurance for the enterprise : A roadmap to information securityMcGraw-Hill
Computer security : principles and practicePearson
How to unblock everything on the internetVIKAS Pub. House PVT LTD

Copyright © 2020 An-Najah National University.
All Rights Reserved.