Your search returned 9 results.

Sort
Results
1.
Counter hack : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis. by Series: Prentice Hall series in computer networking and distributed systems
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Prentice Hall PTR, c2002
Availability: Items available for loan: University of Sargodha-Central Library (1)Call number: 004.65 SKC.

2.
Security planning & disaster recovery / Eric Maiwald, William Sieglein. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : McGraw-Hill/Osborne, c2002
Other title:
  • Security planning and disaster recovery
Availability: Items available for loan: University of Sargodha-Central Library (3)Call number: 005.8/MAS, ...

3.
Enterprise security / Robert C. Newman. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Prentice Hall, c2003
Availability: Items available for loan: University of Sargodha-Central Library (1)Call number: 005.8 NEE.

4.
Counter hack : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis. by Series: Prentice Hall series in computer networking and distributed systems
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Prentice Hall PTR, c2002
Availability: Items available for loan: University of Sargodha-Central Library (2)Call number: 005.8 SKC, ...

5.
Who owns information? : from privacy to public access / Anne Wells Branscomb. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, NY : BasicBooks, c1994
Online resources:
Availability: Items available for loan: University of Sargodha-Central Library (1)Call number: 342.73 BRA.

6.
A practical guide to security assessments / Sudhanshu Kairab. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, Fla. : Auerbach Publications, c2005
Other title:
  • Security assessments
Online resources:
Availability: Items available for loan: University of Sargodha-Central Library (1)Call number: 658.47 KAA.

7.
Privacy in the information age / Harry Henderson. by Series: Library in a book
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Facts On File, c1999
Availability: Items available for loan: University of Sargodha-Central Library (1)Call number: 323.448 HEL.

8.
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger. by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Prentice Hall, c2007; New Delhi: Pearson, 2013
Online resources:
Availability: Items available for loan: University of Sargodha-Central Library (1)Call number: 005.8 PLS.

9.
Information security management handbook / by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, Fl : Auerbach, 2003
Availability: Items available for loan: University of Sargodha-Central Library (1)Call number: 658.0558 INF.

Pages
©️ All rights reserves. Atomation Section