Refine your search

Your search returned 307 results.

Not what you expected? Check for suggestions
Sort
Results
281.
Blockchain for information security and privacy / edited by Udai Pratap Rao, Piyush Kumar Shukla, Chandan Trivedi, Sweta Gupta, and Zelalem Sintayehu Shibeshi. by
Edition: First edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boca Raton, FL : CRC Press, ©2022
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.74 SWE-B 63269.

282.
Blockchain for information security and privacy / edited by Udai Pratap Rao, Piyush Kumar Shukla, Chandan Trivedi, Sweta Gupta, and Zelalem Sintayehu Shibeshi. by
Edition: First edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boca Raton, FL : CRC Press, [2022]
Availability: Items available for loan: COMSATS University Wah Campus (1)Call number: 005.74 RAO 24747.

283.
Blockchain for cybersecurity in cyber-physical systems / edited by Yassine Maleh, Mamoun Alazab, Imed Romdhani, by Series: Advances in information security ; 102
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Cham, Switzerland : Springer, ©2023
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 BLO 63315 .

284.
Blockchain for cybersecurity in cyber-physical systems Yassine Maleh, Mamoun Alazab, Imed Romdhani, editors by Series: Advances in information security ; 102
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Cham, Switzerland : Springer, 2023
Availability: Items available for loan: COMSATS University Wah Campus (1)Call number: 005.824 MAL 24685.

285.
Biology [Book] how life works / James Morris, Daniel Hartl, Andrew Knoll, Robert Lue and Melissa Michael. by
Material type: Text Text; Literary form: Not fiction
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (3)Call number: 570 MOR-B 62419, ...

286.
Big data recommender systems Book / volume 1 : algorithms, architectures, big data, security and trust. edited by Osman Khalid, Samee U. Khan and Albert Y. Zomaya. Volume 1 of 2 volumes. by Series: IET professional applications of computing series ; 1
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: The Institution of Engineering and Technology London 2019
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.7 KHA-B.

287.
288.
Big data Book : storage, sharing, and security / edited by Fei Hu. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Boca Raton : Auerbach, ?2020
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.7 HU-B 61844.

289.
Basic methods of cryptography [Book] / Jan C.A. van der Lubbe ; translated by Steve Gee. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cambridge, U.K. ; New York : Cambridge University Press, 1998
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.82 LUB-B.

290.
Auerbach data security management. [Book] Series: Auerbach information management series
Material type: Continuing resource Continuing resource; Format: print
Publication details: Pennsauken, NJ : Auerbach Publishers.
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 658.478 AUE.

291.
The art of intrusion Book : the real stories behind the exploits of hackers, intruders & deceivers / Kevin D. Mitnick, William L. Simon. by
Material type: Text Text; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley Publishing Inc, ©2006
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 MIT-A 62613.

292.
The art of data analysis [Book] : how to answer almost any question using basic statistics / Kristin H. Jarman. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, New Jersey : John Wiley & Sons Inc., 2013
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (2)Call number: 519.5 JAR-A, ...

293.
Applied Oracle security [Book] : developing secure database and middleware environments / David C. Knox ... [et al.]. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Oracle Press/McGraw-Hill, c2010
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 APP.

294.
Applied cryptography [Book] : protocols, algorithms, and source code in C / Bruce Schneier. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: India : John Wiley & Sons (Asia), c2003
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.82 SCH-A.

295.
Applied cryptography [Book] Protocols, Algorithms, and source code in C. by
Edition: 2nd
Material type: Text Text
Publication details: New Delhi Wiley 2006
Availability: Items available for loan: COMSATS University Wah Campus (2)Call number: 005.82 SCH, ...

296.
Applied Cryptography [Book] protocols, algorithms, and source code in C Bruce Schneier. by
Edition: 2nd Ed.
Material type: Text Text
Publication details: John Wiley & Sons Asia Pte. Ltd.
Availability: Items available for loan: COMSATS University Abbottabad Campus (2)Call number: 005.82 SCH, ...

297.
Applied Cryptography [Book] protocols, algorithms, and source code in C Bruice Schneier. by
Edition: 2nd Ed.
Material type: Text Text
Publication details: John Wiley & Sons Pvt. Ltd. New Delhi
Availability: Items available for loan: COMSATS University Abbottabad Campus (1)Call number: 005.82 SCH.

298.
Applications of supervised and unsupervised ensemble methods Software or E-Resource/ Oleg Okun and Giorgio Valentini (eds.). by Series: Studies in computational intelligence ; 245
Material type: Text Text; Literary form: Not fiction
Publication details: Berlin : Springer, c2009
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.74 APP.

299.
Application security program handbook : a guide for software engineers and team leaders / Derek Fisher by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Shelter Island : Manning Publications, 2022
Availability: Items available for loan: COMSATS University Abbottabad Campus (1)Call number: 005.3 FIS.

300.
The antivirus hacker's handbook / [Book] Joxean Koret, Elias Bachaalany. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.84 KOR-A.

Pages