Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer security
Electronic books
(161)
Computer networks
(136)
Cryptography
(82)
Data protection
(81)
Computer science
(71)
more ...
Additional Suggested Topics
... within your search.
Data encryption (Computer science)
(68)
Congresses
(66)
Congresses and conventions
(51)
ความปลอดภัยในระบบคอมพิวเตอร์
(40)
Computer crimes
(37)
Computer access control
(36)
Computer communication systems
(35)
Security measures
(33)
Information technology
(32)
Computer hackers
(31)
Coding theory
(28)
Electronic book
(26)
Management information systems
(21)
Number theory
(21)
Computers
(20)
Algorithms
(18)
แฮกเกอร์
(17)
Computers and civilization
(15)
Computer software
(12)
Electrical engineering
(12)
Microsoft Windows (Computer file)
(12)
Artificial intelligence
(11)
Computer network security
(11)
Database security
(11)
less ...
Showing
181
-
200
of
674
for search:
''
, query time: 0.03s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Authentication codes in the query model
by
Safavi-Naini, R
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Collision in the DSA function
by
Shparlinski, Igor E
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
The current status in design of efficient provably secure cryptographic pseudorandom generators
by
Steinfeld, R
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
The successive minima profile of multisequences
by
Wang, Li-Ping
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
A construction of optimal sets of FH sequences
by
Yin, Jianxing
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Computer security : principles and practice /
by
Stallings, William
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Practical embedded security : building secure resource-constrained systems /
by
Stapko, Timothy
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Principles of incident response and disaster recovery /
by
Whitman, Michael E
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Security power tools /
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Cryptology unlocked /
by
Wobst, Reinhard
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Microsoft Windows server 2008 security resource kit /
by
Johansson, Jesper M
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Network security and management /
by
Singh, Brijendra
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Information assurance : dependability and security in networked systems /
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Distributed systems security : issues, processes, and solutions /
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
The Mac hacker's handbook /
by
Miller, Charlie
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Active directory disaster recovery : expert guidance on planning and implementing active directory disaster recovery plans /
by
Rommel, Florian
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Cracker : เปิดโปง ป้องกัน ขบวนการ crack /
by
พฤศจิ น้อยหุ่น
Published 2537
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Contemporary cryptology : the science of information integrity /
Published 1992
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Computer communications security : principles, standard protocols and techniques /
by
Ford, Warwick
Published 1994
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Computer and communications security : strategies for the 1990s /
by
Cooper, James Arlin
Published 1989
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
[1]
« Prev
5
6
7
8
9
10
11
12
13
14
15
Next »
[34]
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Suggested Topics: Computer security
Institution
KMUTT
(674)
Library
mai
(263)
zzz
(5)
Format
MONOGRAPHS
(137)
EBOOKS
(124)
RESEARCHREP
(3)
PERIODICALS
(2)
ARTICLES
(1)
more ...
SENPROJECTS
(1)
less ...
Call Number
Q - Science
(464)
T - Technology
(87)
H - Social Science
(30)
A - General Works
(1)
K - Law
(1)
more ...
M - Music
(1)
Z - Library Science
(1)
less ...
Author
Whitman, Michael E
(7)
Peltier, Thomas R
(4)
Scambray, Joel
(4)
Stanek, William R
(4)
ทศพล กนกนุวัตร์
(4)
more ...
Coppersmith, Don
(3)
Herrmann, Debra S.
(3)
Knudsen, Lars R
(3)
Stallings, William
(3)
จตุชัย แพงจันทร์
(3)
Anderson, Ross J
(2)
Androulidakis, Iosif I
(2)
Ayala, Luis
(2)
Bacik, Sandy
(2)
Carvey, Harlan
(2)
Cooper, James Arlin
(2)
Cramer, Ronald
(2)
Ferguson, Niels
(2)
Gregory, Peter
(2)
Herrmann, Debra S
(2)
Jang, Michael
(2)
Katz, Jonathan
(2)
Kissell, Joe
(2)
Konheim, Alan G
(2)
Long, Johnny
(2)
McClure, Stuart
(2)
Nemati, Hamid
(2)
Panko, Raymond R
(2)
Peltier, Thomas R.
(2)
Pfleeger, Charles P
(2)
less ...
Language
English
(633)
Thai
(41)
Genre
Electronic books
(19)
Case studies
(1)
Periodicals
(1)
Study guides
(1)
Region
United States
(3)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website