Skip to content
VuFind
Advanced
Advanced
  • Search:
Suggested Topics... within your search.
Security measures 29 Computer networks -- 18 Computer security 9
Internet -- 6 Computer networks 5 Wireless communication systems -- 5
more ...
Security measures -- 4 Computer crimes -- 3 Design and construction 3
Industrial applications 3 Information networks -- 3 Internet of things 3
Internet of things -- 3 Wireless communication systems 3 5G mobile communication systems 2
Artificial intelligence -- 2 Computer security -- 2 Cooperating objects (Computer systems) 2
Cyberspace -- 2 Data encryption (Computer science) 2 Machine learning 2
Prevention 2 Routers (Computer networks) -- 2 Telecommunication -- 2
5G mobile communication systems -- 1 Ad hoc networks (Computer networks) -- 1 Adaptive signal processing 1
Analysis of covariance 1 Anomaly detection (Computer security) -- 1 Authentication 1
less ...
Showing 1 - 20 of 64 for search: '', query time: 0.16s
Cover Image
Hacking exposed wireless : wireless security secrets & solutions
by Cache, Johnny
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Implementing SSL/TLS Using Cryptography and PKI
by Davies, Joshua
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Computer networks
by Tanenbaum, Andrew S
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Designing network security
by Kaeo, Merike
Published 2004
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Security of self-organizing networks : MANET, WSN, WMN, VANET
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cyberspace and cybersecurity
by Kostopoulos, George K
Published 2013
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Information security governance simplified : from the boardroom to the keyboard
by Fitzgerald, Todd
Published 2012
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Network attacks and defenses : a hands-on approach
by Trabelsi, Zouheir
Published 2013
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Security for wireless sensor networks using identity-based cryptography
by Patil, Harsh Kupwade
Published 2013
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS
by Macaulay, Tyson
Published 2012
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Smart card security : applications, attacks, and countermeasures
by Gupta, B. B
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security analytics for the internet of everything
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cellular internet of things : from massive deployments to critical 5G applications
by Liberg, Olof
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer network
by Shinde, S. S
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Guide to computer network security
by Kizza, Joseph Migga
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer networks : a systems approach
by Peterson, Larry L
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity : public sector threats and responses
by Andreasson, Kim
Published 2012
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Compressive sensing for urban radar
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cryptography and network security : principles and practice
by Stallings, William
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
6G enabling technologies : new dimensions to wireless communication
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

  • 1
  • 2
  • 3
  • 4
  • Next »
  • [4]
Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Call Number: T - Technology Collection: Book Program: Computer Science (Network Security and Digital Forensic), Degree
Library
54 Shah Alam 10 Bestari Jaya
Collection
Book
Item Category
54 EBOOK 11 OPEN SHELF
Faculty
64 Communication, Visual Art & Computing, Faculty
Program
Computer Science (Network Security and Digital Forensic), Degree 1 Mathematics with Statistics, Degree
Call Number
T - Technology
Author
2 Aweya, James 2 Stamp, Mark 1 Andreasson, Kim 1 Cache, Johnny 1 Das, Ravindra 1 Davies, Joshua more ... 1 De Guise, Preston 1 DeFranco, Joanna F. 1 Finger, Matthias 1 Fitzgerald, Todd 1 Garbis, Jason, 1 Gupta, B. B 1 Kaeo, Merike 1 King, Steve 1 Kizza, Joseph Migga 1 Kostopoulos, George K 1 Kurose, James F 1 Li, Ming 1 Liberg, Olof 1 Liu, Jun 1 Macaulay, Tyson 1 Manjikian, Mary 1 Montezuma, Paulo 1 Ning, Huansheng 1 Patil, Harsh Kupwade 1 Peterson, Larry L 1 Shinde, S. S 1 Shoemaker, Dan 1 Song, Wei 1 Soni, Sabhyata less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...