Logo Politeknik Seberang Perai
1. Book Designing network security

by Kaeo, Merike.

Publisher: Indianapolis : Cisco Systems, 1999Availability: Copies available for loan: [TK5105.59.K34 1999 ] (5). Actions: Add to cart
2. Book Computer security fundamentals

by Easttom, Chuck.

Publisher: Upper Saddle River,New Jersey : Pearson education, 2006Availability: Copies available for loan: [QA76.9 E325 2006 ] (1). Actions: Add to cart
3. Book Java network security

by Macgregor, Robert.

Publisher: Upper Saddle River, New Jersey : Prentice Hall, 1998Availability: Copies available for loan: [QA76.73.J38J378 1998 ] (5). Copies available for reference: [QA76.73.J38 J378 1998 ] (3 ).
Actions: Add to cart
4. Book Principles of information systems security : text and cases

by Dhillon, Gurpreet.

Publisher: New Jersey : John Wiley & Sons, 2007Availability: Copies available for loan: [QA76.9.A25 D55 2007 ] (1). Actions: Add to cart
5. Book Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhem

by Walker, Andy (Andy G.).

Publisher: Indianapolis, Ind. : Que, c2009Online Access: Table of contents only Availability: Copies available for loan: [QA76.9.A25 W177 2009 ] (1). In transit (1). Actions: Add to cart
6. Book with CD Mike Meyers' CompTIA security+ certification

by Meyers, Michael; Samuelle, T. J.

Edition: 2nd ed.Publisher: New York : McGraw-Hill, c2009Other title: CompTIA security+ certification.Availability: Copies available for loan: [QA76.3.M612 2009] (2). Copies available for reference: [QA76.3.M612 2009] (2 ).
Actions: Add to cart
7. Book Network security essentials : applications and standards

by Stallings, William.

Publisher: Upper Saddle River, NJ : Prentice Hall, 1999Availability: Copies available for loan: [TK5105.59 .S725 1999] (4). Copies available for reference: [TK5105.59 .S725 1999] (1 ).
Actions: Add to cart
8. Book Principles of information security

by Whitman, Michael E; Mattord, Herbert J.

Edition: Fifth editionAvailability: Copies available for loan: [TK5105.59 .W54 2016] (1). Actions: Add to cart
9. Book APPLIED INFORMATION SECURITY : A Hands-On Guide to Information Security Software

by Boyle, Randall.

Edition: 1st ed.Availability: Copies available for reference: [QA76.9.A25 .B792 2010] (1 ). Actions: Add to cart
10. Book Security intelligence : a practitioner's guide to solving enterprise security challenges

by Li, Qing; Clark, Gregory.

Availability: Copies available for reference: [TK5105.59 .L52 2015] (1 ). Actions: Add to cart
11. Book The network security test lab : a step by step guide

by Gregg, Michael.

Availability: Copies available for reference: [TK5105.59 .G819 2015] (1 ). Actions: Add to cart
12. Book Integrated Security Technologies and Solutions - Volume 1 : Cisco security solutions for advanced threat protection with next generation firewall, intrusion prevention, AMP, and content security

by Woland, Aaron; Santuka, Vivek; Harris, Mason; Sanbower, Jamie.

Availability: Copies available for loan: [TK5105.59 .W848 2018] (1). Actions: Add to cart
13. Book Computer security : principles and practice

by Stallings, William; Brown, Lawrie.

Edition: Pearson International EditionAvailability: Copies available for loan: [QA76.9.A25 S685 2018] (1). Actions: Add to cart
14. Book Security in the Digital World

by Day, Graham.

Publisher: Cambridgeshire, UK IT Governance Publishing 2017Availability: Copies available for loan: [QA76.9.A25 D39 2017] (1). Actions: Add to cart
Powered by Koha. Content copyrighted by Perpustakaan Politeknik Seberang Perai © 2023