Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer security
Computer science
(71)
Congresses and conventions
(51)
Computer networks
(50)
Data encryption (Computer science)
(40)
Computer communication systems
(35)
more ...
Additional Suggested Topics
... within your search.
Data protection
(29)
Electronic book
(25)
Management information systems
(21)
Algorithms
(16)
Computers and civilization
(15)
Security measures
(15)
Information technology
(14)
Computer crimes
(12)
Electrical engineering
(12)
ความปลอดภัยในระบบคอมพิวเตอร์
(10)
Computers
(9)
Artificial intelligence
(8)
Microsoft Windows (Computer file)
(8)
Coding theory
(7)
Computer network security
(7)
Electronic books
(7)
Operating systems (Computers)
(7)
Computer hackers
(6)
Computer software
(6)
Computer system failures
(6)
Cryptography
(6)
Database management
(6)
Database security
(6)
Engineering
(6)
less ...
Showing
1
-
20
of
263
for search:
''
, query time: 0.03s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Next generation SSH2 implementation : securing data in motion /
by
Liu, Dale
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
The security+ exam guide /
by
Crayton, Christopher A
Published 2003
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Hardening network infrastructure /
by
Noonan, Wesley J
Published 2004
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Management of information security /
by
Whitman, Michael E
Published 2004
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Windows Vista security : securing Vista against malicious attacks /
by
Grimes, Roger A
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Digital privacy : PRIME - privacy and identity management for Europe /
Published 2011
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Cybersecurity for industry 4.0 : analysis for design and manufacturing /
Published 2017
Call Number:
Loading
Located:
Loading
FullText
EBOOKS
Add to Favorites
Communication, devices, and computing : proceedings of ICCDC 2017 /
Published 2017
Call Number:
Loading
Located:
Loading
FullText
EBOOKS
Add to Favorites
From Hacking to Report Writing : An Introduction to Security and Penetration Testing /
by
Svensson, Robert
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
CISSP guide to security essentials /
by
Gregory, Peter
Published 2010
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Privacy and identity management for life : 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011 : revised selected...
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Information security management handbook /
by
Tipton, Harold F
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
The shellcoder's handbook : discovering and exploiting security holes /
Published 2004
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
New threats and countermeasures in digital crime and cyber terrorism /
Published 2015
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Hardware security and trust : design and deployment of integrated circuits in a threatened environment /
Published 2017
Call Number:
Loading
Located:
Loading
FullText
EBOOKS
Add to Favorites
Open Problems in Network Security : IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers /
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Security in distributed, grid, mobile, and pervasive computing
by
Xiao, Yang, 1966-
Published 2007
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
EBOOKS
Add to Favorites
Breaking into information security : crafting a custom career path to get the job you really want /
by
More, Josh
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Physical and Data-Link Security Techniques for Future Communication Systems /
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Physical-Layer Security for Cooperative Relay Networks /
by
Zou, Yulong
Published 2016
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
1
2
3
4
5
6
7
8
9
10
11
Next »
[14]
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Library: mai
Suggested Topics: Computer security
Institution
KMUTT
(263)
Library
mai
Format
MONOGRAPHS
(133)
EBOOKS
(123)
RESEARCHREP
(3)
PERIODICALS
(2)
ARTICLES
(1)
more ...
SENPROJECTS
(1)
less ...
Call Number
Q - Science
(204)
T - Technology
(46)
H - Social Science
(9)
A - General Works
(1)
M - Music
(1)
Author
Anderson, Ross J
(2)
Androulidakis, Iosif I
(2)
Ayala, Luis
(2)
Ferguson, Niels
(2)
Gregory, Peter
(2)
more ...
Jang, Michael
(2)
Kissell, Joe
(2)
Long, Johnny
(2)
McClure, Stuart
(2)
Panko, Raymond R
(2)
Scambray, Joel
(2)
Whitman, Michael E
(2)
ยงยุทธ เพิ่มพูนธนลาภ
(2)
แสงสุรีย์ วสุพงศ์อัยยะ
(2)
Al-Shaer, Ehab
(1)
Andres, Steven
(1)
Androulidakis, Iosif
(1)
Arnold, Michael
(1)
Ashbaugh, Douglas A
(1)
Atreya, Mohan
(1)
Bertocci, Vittorio
(1)
Bowers, Dan M
(1)
Bragg, Roberta
(1)
Brotby, Krag
(1)
Brotby, W. Krag
(1)
Campbell, Tony
(1)
Carroll, Brandon
(1)
Carter, Peter A
(1)
Collette, Ron
(1)
Conrad, Eric
(1)
less ...
Language
English
(252)
Thai
(11)
Genre
Periodicals
(1)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website