Handbook of information security
Material type:

Item type | Current library | Call number | Vol info | Status | Barcode | |
---|---|---|---|---|---|---|
![]() |
National Science Library | D 681.324.004.4 P6.1 (Browse shelf(Opens below)) | Vol.1, 2006 | Available | 226696 | |
![]() |
National Science Library | D 681.324.004.4 P6 (Browse shelf(Opens below)) | Vol.2, 2006 | Available | 226697 | |
![]() |
National Science Library | D 681.324.004.4 P6 (Browse shelf(Opens below)) | Vol.3, 2006 | Available | 226698 |
Browsing National Science Library shelves Close shelf browser (Hides shelf browser)
No cover image available No cover image available | No cover image available No cover image available | No cover image available No cover image available | No cover image available No cover image available | No cover image available No cover image available | No cover image available No cover image available | No cover image available No cover image available | ||
D 681.324.004.4 P6 Cryptography theory and practice | D 681.324.004.4 P6 Handbook of information security | D 681.324.004.4 P6 Handbook of information security | D 681.324.004.4 P6.1 Handbook of information security | D 681.324.004.4 P7 Google hacking: An ethical guide | D 681.324.004.4 P8 Securing the information infrastructure | D 681.324.004.4 P8 Critical infrastructure protection |
Vol.1 (Key concepts, infrastructure, standards and protocols); ISBN: 978-0-471-64830-7; xxvii, 1092p.
Vol.2 (Information warfare; social, legal and international issues; and security foundations); ISBN: 978-0-471-64831-4; xxvii, 978p.
Vol.3 (Threats, vulnerabilities, prevention, detection and management); ISBN: 978-0-471-64832-1; xxvii, 1124p.
There are no comments on this title.
Log in to your account to post a comment.