Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer security
Electronic books
(161)
Computer networks
(136)
Cryptography
(82)
Data protection
(81)
Computer science
(71)
more ...
Additional Suggested Topics
... within your search.
Data encryption (Computer science)
(68)
Congresses
(66)
Congresses and conventions
(51)
ความปลอดภัยในระบบคอมพิวเตอร์
(40)
Computer crimes
(37)
Computer access control
(36)
Computer communication systems
(35)
Security measures
(33)
Information technology
(32)
Computer hackers
(31)
Coding theory
(28)
Electronic book
(26)
Management information systems
(21)
Number theory
(21)
Computers
(20)
Algorithms
(18)
แฮกเกอร์
(17)
Computers and civilization
(15)
Computer software
(12)
Electrical engineering
(12)
Microsoft Windows (Computer file)
(12)
Artificial intelligence
(11)
Computer network security
(11)
Database security
(11)
less ...
Showing
1
-
20
of
674
for search:
''
, query time: 0.47s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
DRM 2003 : proceedings of the Third ACM Workshop on Digital Rights Management : Washington, DC, USA /
Published 2003
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
ปิดทางแฮกเกอร์บน Windows Server 2003 /
by
สแคมเบรย์, โจเอล
Published 2547
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Defeating the hacker : a non-technical guide to computer security /
by
Schifreen, Robert
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
เปิดโปงแฮกเกอร์.
by
ทรงเกียรติ ภาวดี
Published 2549
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Complexity theory and cryptology : an introduction to cryptocomplexity /
by
Rothe, Jorg
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Writing information security policies /
by
Barman, Scott
Published 2002
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Enterprise security /
by
Newman, Robert C
Published 2003
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Basics of contemporary cryptography for IT practitioners /
by
Ryabko, Boris
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Hacking exposed web applications /
by
Scambray, Joel
Published 2002
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Cryptography, information theory, and error-correction : a handbook for the 21st century /
by
Bruen, Aiden A
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Effective Oracle database 10g security by design /
by
Knox, David
Published 2004
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
รหัสลับ รหัสร้อน = Hacker step 2001 /
by
ทศพล กนกนุวัตร์
Published 2542
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
How to protect from hackers เข้ารหัส ป้องกันระบบ /
by
ทศพล กนกนุวัตร์
Published 2542
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
ของฟรีบนอินเทอร์เน็ตและสลัดไฮเทค /
by
ไพศาล ชื่นพระแสง
Published 2542
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Phishing : cutting the identity theft line /
by
Lininger, Rachael
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Network and internetwork security : principles and practice /
by
Stallings, William
Published 1995
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Security patterns : integrating security and systems engineering /
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Principles of information security /
by
Whitman, Michael E
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
วิทยาการรหัสลับเบื้องต้น /
Published 2548
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
The database hacker's handbook : defending database servers /
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
1
2
3
4
5
6
7
8
9
10
11
Next »
[34]
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Suggested Topics: Computer security
Institution
KMUTT
(674)
Library
mai
(263)
zzz
(5)
Format
MONOGRAPHS
(137)
EBOOKS
(124)
RESEARCHREP
(3)
PERIODICALS
(2)
ARTICLES
(1)
more ...
SENPROJECTS
(1)
less ...
Call Number
Q - Science
(464)
T - Technology
(87)
H - Social Science
(30)
A - General Works
(1)
K - Law
(1)
more ...
M - Music
(1)
Z - Library Science
(1)
less ...
Author
Whitman, Michael E
(7)
Peltier, Thomas R
(4)
Scambray, Joel
(4)
Stanek, William R
(4)
ทศพล กนกนุวัตร์
(4)
more ...
Coppersmith, Don
(3)
Herrmann, Debra S.
(3)
Knudsen, Lars R
(3)
Stallings, William
(3)
จตุชัย แพงจันทร์
(3)
Anderson, Ross J
(2)
Androulidakis, Iosif I
(2)
Ayala, Luis
(2)
Bacik, Sandy
(2)
Carvey, Harlan
(2)
Cooper, James Arlin
(2)
Cramer, Ronald
(2)
Ferguson, Niels
(2)
Gregory, Peter
(2)
Herrmann, Debra S
(2)
Jang, Michael
(2)
Katz, Jonathan
(2)
Kissell, Joe
(2)
Konheim, Alan G
(2)
Long, Johnny
(2)
McClure, Stuart
(2)
Nemati, Hamid
(2)
Panko, Raymond R
(2)
Peltier, Thomas R.
(2)
Pfleeger, Charles P
(2)
less ...
Language
English
(633)
Thai
(41)
Genre
Electronic books
(19)
Case studies
(1)
Periodicals
(1)
Study guides
(1)
Region
United States
(3)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website