Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer security
Data protection
(3)
Computer networks
(2)
Cryptography
(2)
Information technology
(2)
Artificial intelligence
(1)
more ...
Additional Suggested Topics
... within your search.
Business enterprises
(1)
Computer crimes
(1)
Data encryption (Computer science)
(1)
Hashing (Computer science)
(1)
Macintosh (Computer)
(1)
Operating systems (Computers)
(1)
Public key cryptography
(1)
Risk management
(1)
Telecommunication
(1)
less ...
Showing
1
-
9
of
9
for search:
''
, query time: 0.02s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
CISSP guide to security essentials /
by
Gregory, Peter
Published 2010
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Cryptography engineering : design principles and practical applications /
by
Ferguson, Niels
Published 2010
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Information security management : concepts and practice /
by
Raggad, Bel G
Published 2010
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Hashing in computer science : fifty years of slicing and dicing /
by
Konheim, Alan G
Published 2010
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams /
by
Kouns, Jake
Published 2010
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Handbook of electronic security and digital forensics /
Published 2010
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Advances in artificial intelligence for privacy protection and security /
Published 2010
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Mac security bible /
by
Kissell, Joe
Published 2010
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Cryptanalysis of RSA and its variants /
by
Hinek, M. Jason
Published 2010
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Year of Publication: 2010
Library: mai
Suggested Topics: Computer security
Institution
KMUTT
(9)
Library
mai
Format
MONOGRAPHS
(9)
Call Number
Q - Science
(7)
H - Social Science
(1)
T - Technology
(1)
Author
Ferguson, Niels
(1)
Gregory, Peter
(1)
Hinek, M. Jason
(1)
Kissell, Joe
(1)
Konheim, Alan G
(1)
more ...
Kouns, Jake
(1)
Raggad, Bel G
(1)
less ...
Language
English
(9)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website