Refine your search

Your search returned 307 results.

Not what you expected? Check for suggestions
Sort
Results
161.
Hacking exposed Linux [Book] : Linux security secrets & solutions / ISECOM. by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : McGraw-Hill, c2008
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 HAC.

162.
Hacking exposed linux [Book] linux security secrets and solutions. Andrea Barisani, Thomas Bader, and Simon Biles by
Edition: Third edition.
Material type: Text Text
Publication details: New York : McGarw-Hill, c2008
Availability: Items available for loan: COMSATS University Attock Campus (1)Call number: 005.8 BAR-H 5477.

163.
Hacking exposed [Book] network security secrets and solutions Stuart Mcclure. by
Edition: 5th Ed.
Material type: Text Text
Publication details: Osborn New York
Availability: Items available for loan: COMSATS University Abbottabad Campus (1)Call number: 005.8 MCC.

164.
Hacker techniques, tools, and incident handling / [Book] / Sean-Philip Oriyano. by Series:
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 ORI-H.

165.
Hacker techniques, tools, and incident handling [Book] Sean-Philip Oriyano. by
Edition: 2nd Ed.
Material type: Text Text
Publication details: Jones & Bartlett Learning USA
Availability: Items available for loan: COMSATS University Abbottabad Campus (1)Call number: 005.8 ORI.

166.
Hacker's challenge [Book] test your incident response skills using 20 scenarios. Mike Schiffman by
Material type: Text Text
Publication details: New York : Osborne/McGraw-Hill, c2001
Availability: Items available for loan: COMSATS University Attock Campus (1)Call number: 005.8 SCH-H 3508.

167.
Hacker attack [Book] Richard Mansfield. by
Material type: Text Text
Availability: Items available for loan: COMSATS University Abbottabad Campus (1)Call number: 005.8 MAN.

168.
The hacker and the state Book : cyber attacks and the new normal of geopolitics / Ben Buchanan. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.87 BUC-H 62467.

169.
Hack attacks testing [Book] : how to conduct your own security audit / John Chirillo. by
Material type: Text Text
Publication details: Indianapolis, Ind. ; [Chichester] : Wiley, c2003
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 CHI-H. Items available for reference: Junaid Zaidi Library, COMSATS University Islamabad: Not for loan (1)Call number: 005.8 CHI-H BK45952.

170.
Guide to network security / [Book] / Michael Whitman ... [et.al.]. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 WHI-G.

171.
Guide to network security / Michael Whitman ... [and 3 others]. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston, MA : Course Technology/Cengage Learning, [2013]Copyright date: ©2013
Availability: Items available for loan: COMSATS University Wah Campus (1)Call number: 005.8 WHI 24521.

172.
Guide to network defense and countermeasures [Book] / Greg Holden. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Australia; Boston, Mass. : Course Technology, c2003
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 HOL-G.

173.
Guide to elliptic curve cryptography with 38 illustration [Book] Darrel Hankerson. by
Material type: Text Text
Publication details: Springer Verlag New York
Availability: Items available for loan: COMSATS University Abbottabad Campus (2)Call number: 005.82 HAN, ...

174.
Guide to computer forensics and investigations Book / Bill Nelson, Amelia Phillips, Chris Steuart. by
Edition: Sixth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (3)Call number: 005.8 NEL-G 61458, ...

175.
Guide to computer forensics and investigations / [Book] Bill Nelson, Amelia Phillips, Christopher Steuart. by
Edition: Fourth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Delhi, India : Cengage Learning India Private Limited, c2010
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 363.25 NEL-G.

176.
Guide to computer forensics and investigations [Book]. Bill Nelson, Amelia Phillips and Christopher Steuart by
Edition: Fourth edition.
Material type: Text Text
Publication details: New Delhi : Cengage Learning, 2015
Availability: Items available for loan: COMSATS University Attock Campus (3)Call number: 005.8 NEL-G 9296, ...

177.
The ghost in the shell : [Book] volume 1 / Shirow Masamune ; translation and English language adaptation Frederik L. Schodt and Toren Smith, additional translation Stephen Paul. by Series: ; 1
Edition: Deluxe edition ; English edition.
Material type: Text Text; Format: print ; Literary form: Fiction
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 741.5 MAS-G.

178.
Fundamentals of information systems security / Book / David Kim, Michael G. Solomon. by
Edition: Third edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 KIM-F 61768.

179.
Fundamentals of information systems security [Book] / David Kim and Michael G. Solomon. by Series: Jones & bartlett Learning information systems & security series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Sudbury, MA : Jones & Bartlett Learning, [2011], c2012
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 KIM-F.

180.
Firewalls and Internet security [Book] : repelling the wily hacker / William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin. by Series: Addison-Wesley professional computing series
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education (Singapore), c2003
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 CHE-F.

Pages