Your search returned 41 results.

Not what you expected? Check for suggestions
Sort
Results
1.
The disaster recovery handbook [Book] : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets / Michael Wallace and Lawrence Webber. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : American Management Association, c2004
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 658.477 WAL-D.

2.
Information security fundamentals [Book] / Thomas R. Peltier. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boca Raton, [Florida] : CRC Press, Taylor & Francis Group, [2014]
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 PEL-I.

3.
Internet security SECRETS / [Book] by John R. Vacca ; foreword by Dana C. Ellingen. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Foster City, CA : IDG Books Worldwide, c1996
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 VAC-I 3.

4.
Innovative solutions for access control management / [Book] / editors Ahmad Kamran Malik, Adeel Anjum and Basit Raza. by Series: Advances in informations security, privacy, and ethics (AISPE)
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 INN.

5.
Engineering information security Book : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs. by Series: IEEE Press series on information and communication networks security
Edition: Seond edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 JAC-E 61263.

6.
Analyzing computer security [Book] a threat/vulnerability/countermeasure approach Charles P. Pfleeger, Shari Lawrence Pfleeger. by
Material type: Text Text; Literary form: Not fiction
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 PFL-A.

7.
Security in computing [Book] / Charles P. Pfleeger, Shari Lawrence Pfleeger and Deven Shah. by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: India : Pearson Education in South Asia, c2009
Availability: Not available: Junaid Zaidi Library, COMSATS University Islamabad: Checked out (1).

8.
Cloud computing security : [Book] foundations and challenges / editor, John R. Vacca. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 VAC-C.

9.
Ocean circulation : [Book] wind-driven and thermohaline processes / by Rui Xin Huang. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : New York : Cambridge University Press, 2010
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (2)Call number: 551.462 HUA-O, ...

10.
Security metrics [Book] : a beginner's guide / Caroline Wong. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : McGraw-Hill, c2012
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 WON-S.

11.
Roadmap to information security : [Book] for IT and InfoSec managers / Michael E. Whitman, Herbert J. Mattord ; by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA : Course Technology/Cengage Learning, c2011
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 WHI-R.

12.
Change management excellence [Book] : using the four intelligences for successful organizational change / Sarah Cook, Steve Macaulay, and Hilary Coldicott. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London ; Sterling, VA : Kogan Page, 2004
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 INF.

13.
The internet of things [Book] : key applications and protocols / Olivier Hersent, David Boswarthick, Omar Elloumi. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chichester, West Sussex : Wiley, 2012
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (2)Call number: 681.2 HER-I, ...

14.
Cloud computing security Book : foundations and challenges / edited by John R. Vacca. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 005.8 CLO 62544.

15.
The security risk assessment handbook Book : a complete guide for performing security risk assessments / Douglas J. Landoll. by
Edition: Third edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 658.47 LAN-S 62617.

16.
5G enabled secure wireless networks / [Book] / edited by Dushantha Nalin K. Jayakody, Kathiravan Srinivasan, Vishal Sharma. by
Material type: Text Text; Literary form: Not fiction
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 621.382 JAY-F 61270.

17.
Enterprise information security and privacy [Book] / C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors. by Series: Artech House information security and privacy series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Artech House, c2009
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 658.478 ENT.

18.
Auerbach data security management. [Book] Series: Auerbach information management series
Material type: Continuing resource Continuing resource; Format: print
Publication details: Pennsauken, NJ : Auerbach Publishers.
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 658.478 AUE.

19.
Information technology law [Book] / Ian J. Lloyd. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London : Butterworths, c1993
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (1)Call number: 344.103999 LLO-I.

20.
Security in computing [Book] / Charles P. Pfleeger. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Prentice Hall PTR, c1997
Availability: Items available for loan: Junaid Zaidi Library, COMSATS University Islamabad (2)Call number: 005.8 PFL-S, ...

Pages