An-Najah Libraries Catalog
Home
Search
Books about "Computer security"
Showing
1-25
of
68
books
Next
Book Title
Publisher
Authors
Subjects
The underground Guide to Computer Security
ALXANDER, MICHAEL
Access control
Microcomputer
Computer security
Cybersecurity : managing systems, conducting testing, and investigating intrusions
John Wiley & Sons
Mowbray, Thomas J.
Security measures
Internet
Computer networks
Security measures
Computer security
Information assurance for the enterprise : A roadmap to information security
McGraw-Hill
Shoemaker, Dan
Data protection
Computer security
2824B Implementing Microsoft Internet Security and Acceleration Server 2004
Microsoft corporation
Microsoft corporation
Security measures
Internet
Computer security
Software
Study and teaching
Computer science
Cyber laws and It protection
PHI Learning
Chander, Harish
Law and legislation
Internet
Computer security
Law and legislation
Telecommunication
Information security and cyber laws
Vikas Publishing house
Sharma, Saurabh
Computer security
Computer crimes
Computer networks
Law and legislation
E-Security
Pacific Books International.
Kumar, Ravindra
Deshpande, Manish
Data protection
Computer security
How to unblock everything on the internet
VIKAS Pub. House PVT LTD
Fadia, Ankit
Security measures
Internet
Computers
Access control
Computer security
Computer security : principles and practice
Pearson
Stallings, William.
Brown, Lawrence V.
Database security
Computer security
CISSP guide to security essentials
Course Technology/Cengage Learning
Gregory, Peter H.
Computer networks
Study guides
Study guides
Computer security
Infrastructure security, A total defense strategy: By Active/Passive attribute analysis and mediating technology synthesis
An-Najah National University
Alqadi, Raed, Supervisor
Jum'ah, Nabeeh Hatim Hasan
Computer security
Computer networks
Security measures
Infrastructure security, A total defense strategy: By Active/Passive attribute analysis and mediating technology synthesis
An-Najah National University
Alqadi, Raed, Supervisor
Jum'ah, Nabeeh Hatim Hasan
Computer security
Computer networks
Security measures
Data protection
Enginnering management
Computer security
Wiley
Gollmann, Dieter.
Computer security
Digital Fortress
Corgi Books
Brown, Dan, 1964-
Fiction
Cryptographer
Fiction
Computer security
Computer Security : Protecting Digital Resources
Jones and Bartlett Publishers
Newman, Robert
Database security
Computer networks
Security measures
Computer security
Security+ guide to network security fundamentals
Course Technology
Ciampa, Mark.
Computer security
Data protection
Surreptitious software : obfuscation, watermarking, and tamperproofing for software
Addison-Wesley
Nagra, Jasvir
Collberg, Christian
Computer security
Data protection
Cryptography
Security awareness : applying practical security in your world
Course Technology, Cengage Learning
Ciampa, Mark D
Computer security
Data protection
Professional ASP.NET 3.5 in C# and VB
Wiley
Evjen, Bill.
Hanselman, Scott.
Rader, Devin, 1976-
Active server pages
Computer security
Microsoft.NET
The Best of 2600 A Hacker Odyssey
Wiley Publishing
Goldstein, Emmanuel
History
Computer crimes
History
Computer security
CISSP : certified information systems security professional study guide
Wiley Pub.
Stewart, James Michael.
Chapple, Mike.
Tittel, Ed.
Examinations
Study guides
Computer security
Computer security principles and practice
Pearson Education International
Stallings, William....[et .al]
Computer security
Closeness centrality and epidemic spreading in networks
An-Najah National University
Rabaya', Fares Masuod Abdelgani
Mathematics
Data processing
Data processing
Numerical analysis
Computer security
Mathematics
Computer science
Writing secure code for Windows Vista
Microsoft
Howard, Michael, 1965-
Microsoft Windows(Computer file)
Computer security
PC magazine Windows Vista security solutions
Wiley Pub.
DiNicolo, Dan
Microsoft Windows(Computer file)
Computer security
Copyright © 2023 An-Najah National University.
All rights reserved.