|
21.
|
Information security risk analysis
by Peltier, Thomas R.
Edition: 3rd ed. Publisher: Boca Raton: Auerbach Publications, 2010Availability: Items available for loan: Central Library AIOU Islamabad (1). Location(s): General Stacks 005.8 PEI.
|
|
22.
|
Data mining and machine learning in cyber security
by Dua, Sumeet;
Du, Xian.
Publisher: Boca Raton: Auerbach Publications, 2011Availability: Items available for loan: Central Library AIOU Islamabad (1). Location(s): General Stacks 005.8 DUD.
|
|
23.
|
Understanding and applying cryptography and data security
by Elbirt, Adam J.
Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: Central Library AIOU Islamabad (1). Location(s): General Stacks 005.8 ELU.
|
|
24.
|
Cyber security essentials
by Graham, Ja ed;
Olson, R. ed;
Howard, R. ed.
Publisher: Boca Raton: Auerbach Publications, 2011Availability: Items available for loan: Central Library AIOU Islamabad (1). Location(s): General Stacks 005.8 CYB.
|
|
25.
|
Data center storage : cost-effective strategies, implementation, and management
by Smith, Hubbert.
Publisher: Boca Raton: Auerbach Publications, 2011Availability: Items available for loan: Central Library AIOU Islamabad (1). Location(s): General Stacks 004.5 SMD.
|
|
26.
|
Knowledge management and E-learning
by Liebowitz, Jay;
Frank, Michael.
Publisher: Boca Raton: Auerbach Publications, 2010Availability: Items available for loan: Central Library AIOU Islamabad (1). Location(s): General Stacks 658.1240285 KNO.
|
|
27.
|
Modeling software behavior : a craftsman's approach
by Jorgensen, Paul C.
Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: Central Library AIOU Islamabad (1). Location(s): General Stacks 005.1 JOM.
|
|
28.
|
Multimedia watermarking techniques and applications
by Furht, Borko;
Kirovski, Darko.
Material type: Book Publisher: New York: Auerbach Publication, 2006Availability: Items available for loan: Central Library AIOU Islamabad (1). Location(s): General Stacks 005.82 MUL.
|
|
29.
|
Information security policies and procedures : a practitioner's reference
by Peltier, Thomas R.
Material type: Book Publisher: London: Auerbach publications, 2004Availability: Items available for loan: Central Library AIOU Islamabad (1). Location(s): General Stacks 005.8 PEI.
|
|
30.
|
Security in distributed grid mobile and pervasive computing
by Xiao, Yang.
Material type: Book Publisher: New York: Auerbach Publications, 2007Availability: Items available for loan: Central Library AIOU Islamabad (1). Location(s): General Stacks 005.8 XIS.
|