|
|
The stephen cobb complete book of PC and LAN security |
APA |
(1990).
The stephen cobb complete book of PC and LAN security,
N.Y:
Windcrest.
|
MLA |
The stephen cobb complete book of PC and LAN security.
N.Y:
Windcrest,
1990.
|
Harvard |
1990.
The stephen cobb complete book of PC and LAN security.
Windcrest,
|
Chicago |
The stephen cobb complete book of PC and LAN security.
Windcrest,
1990.
|
|
|
Cryptography and network security : principles and practice |
APA |
(1998).
Cryptography and network security : principles and practice,
Upper Saddle River, New Jersey:
Prentice Hall.
|
MLA |
Cryptography and network security : principles and practice.
Upper Saddle River, New Jersey:
Prentice Hall,
1998.
|
Harvard |
1998.
Cryptography and network security : principles and practice.
Prentice Hall,
|
Chicago |
Cryptography and network security : principles and practice.
Prentice Hall,
1998.
|
|
|
Hacking exposed: network security, secrets and solutions |
APA |
(2001).
Hacking exposed: network security, secrets and solutions,
Berkeley:
Osborne/ McGraw - Hill.
|
MLA |
Hacking exposed: network security, secrets and solutions.
Berkeley:
Osborne/ McGraw - Hill,
2001.
|
Harvard |
2001.
Hacking exposed: network security, secrets and solutions.
Osborne/ McGraw - Hill,
|
Chicago |
Hacking exposed: network security, secrets and solutions.
Osborne/ McGraw - Hill,
2001.
|
|
|
Windows 2000 security handbook |
APA |
(2001).
Windows 2000 security handbook,
Berkeley, California:
Osborne/ McGraw - Hill.
|
MLA |
Windows 2000 security handbook.
Berkeley, California:
Osborne/ McGraw - Hill,
2001.
|
Harvard |
2001.
Windows 2000 security handbook.
Osborne/ McGraw - Hill,
|
Chicago |
Windows 2000 security handbook.
Osborne/ McGraw - Hill,
2001.
|
|
|
Windows 2000 user management |
APA |
(2000).
Windows 2000 user management,
Indianapolis, Indiana:
New Riders.
|
MLA |
Windows 2000 user management.
Indianapolis, Indiana:
New Riders,
2000.
|
Harvard |
2000.
Windows 2000 user management.
New Riders,
|
Chicago |
Windows 2000 user management.
New Riders,
2000.
|
|
|
Firewalls : a complete guide |
APA |
(2000).
Firewalls : a complete guide,
New York:
McGraw - Hill.
|
MLA |
Firewalls : a complete guide.
New York:
McGraw - Hill,
2000.
|
Harvard |
2000.
Firewalls : a complete guide.
McGraw - Hill,
|
Chicago |
Firewalls : a complete guide.
McGraw - Hill,
2000.
|
|
|
Practical firewalls |
APA |
(2000).
Practical firewalls,
Indianapolis, Indiana:
Que.
|
MLA |
Practical firewalls.
Indianapolis, Indiana:
Que,
2000.
|
Harvard |
2000.
Practical firewalls.
Que,
|
Chicago |
Practical firewalls.
Que,
2000.
|
|
|
Configuring Windows 2000 server security |
APA |
(2000).
Configuring Windows 2000 server security,
Rockland, MA:
Syngress Media.
|
MLA |
Configuring Windows 2000 server security.
Rockland, MA:
Syngress Media,
2000.
|
Harvard |
2000.
Configuring Windows 2000 server security.
Syngress Media,
|
Chicago |
Configuring Windows 2000 server security.
Syngress Media,
2000.
|
|
|
IT manager's guide to virtual private networks |
APA |
(1999).
IT manager's guide to virtual private networks,
New York:
McGraw - Hill.
|
MLA |
IT manager's guide to virtual private networks.
New York:
McGraw - Hill,
1999.
|
Harvard |
1999.
IT manager's guide to virtual private networks.
McGraw - Hill,
|
Chicago |
IT manager's guide to virtual private networks.
McGraw - Hill,
1999.
|
|
|
Cisco network security |
APA |
(2001).
Cisco network security,
Upper Saddle River, New Jersey:
Prentice - Hall.
|
MLA |
Cisco network security.
Upper Saddle River, New Jersey:
Prentice - Hall,
2001.
|
Harvard |
2001.
Cisco network security.
Prentice - Hall,
|
Chicago |
Cisco network security.
Prentice - Hall,
2001.
|
|
|
Security complete |
APA |
(2001).
Security complete,
San Francisco:
SYBEX.
|
MLA |
Security complete.
San Francisco:
SYBEX,
2001.
|
Harvard |
2001.
Security complete.
SYBEX,
|
Chicago |
Security complete.
SYBEX,
2001.
|
|
|
Financial cryptography : First International Conference, FC '97, Anguilla,
British West Indies, February 24-28, 1997 : proceedings |
APA |
(1997).
Financial cryptography : First International Conference, FC '97, Anguilla,
British West Indies, February 24-28, 1997 : proceedings,
Berlin:
Springer.
|
MLA |
Financial cryptography : First International Conference, FC '97, Anguilla,
British West Indies, February 24-28, 1997 : proceedings.
Berlin:
Springer,
1997.
|
Harvard |
1997.
Financial cryptography : First International Conference, FC '97, Anguilla,
British West Indies, February 24-28, 1997 : proceedings.
Springer,
|
Chicago |
Financial cryptography : First International Conference, FC '97, Anguilla,
British West Indies, February 24-28, 1997 : proceedings.
Springer,
1997.
|
|
|
Maximum security |
APA |
(2001).
Maximum security,
Indianapolis, Indiana:
Sams.
|
MLA |
Maximum security.
Indianapolis, Indiana:
Sams,
2001.
|
Harvard |
2001.
Maximum security.
Sams,
|
Chicago |
Maximum security.
Sams,
2001.
|
|
|
Information security risk analysis |
APA |
(2001).
Information security risk analysis,
Boca Raton:
Auerbach.
|
MLA |
Information security risk analysis.
Boca Raton:
Auerbach,
2001.
|
Harvard |
2001.
Information security risk analysis.
Auerbach,
|
Chicago |
Information security risk analysis.
Auerbach,
2001.
|
|
|
Security and privacy for e-business |
APA |
(2001).
Security and privacy for e-business,
New York:
John Wiley and Sons, Inc..
|
MLA |
Security and privacy for e-business.
New York:
John Wiley and Sons, Inc.,
2001.
|
Harvard |
2001.
Security and privacy for e-business.
John Wiley and Sons, Inc.,
|
Chicago |
Security and privacy for e-business.
John Wiley and Sons, Inc.,
2001.
|
|
|
How secure is your wireless network? safeguarding your Wi-Fi Lan |
APA |
(2004).
How secure is your wireless network? safeguarding your Wi-Fi Lan,
Upper Saddle River, New Jersey:
Prentice Hall.
|
MLA |
How secure is your wireless network? safeguarding your Wi-Fi Lan.
Upper Saddle River, New Jersey:
Prentice Hall,
2004.
|
Harvard |
2004.
How secure is your wireless network? safeguarding your Wi-Fi Lan.
Prentice Hall,
|
Chicago |
How secure is your wireless network? safeguarding your Wi-Fi Lan.
Prentice Hall,
2004.
|
|
|
Wireless operational security |
APA |
(2004).
Wireless operational security,
Amsterdam:
Elsevier.
|
MLA |
Wireless operational security.
Amsterdam:
Elsevier,
2004.
|
Harvard |
2004.
Wireless operational security.
Elsevier,
|
Chicago |
Wireless operational security.
Elsevier,
2004.
|
|
|
Public key infrastructure: building trusted applications and web services
|
APA |
(2004).
Public key infrastructure: building trusted applications and web services
,
Bocca Raton:
Auerbach Publications.
|
MLA |
Public key infrastructure: building trusted applications and web services
.
Bocca Raton:
Auerbach Publications,
2004.
|
Harvard |
2004.
Public key infrastructure: building trusted applications and web services.
Auerbach Publications,
|
Chicago |
Public key infrastructure: building trusted applications and web services.
Auerbach Publications,
2004.
|
|
|
Defend I.T. : security by example |
APA |
(2004).
Defend I.T. : security by example,
Boston:
Addison-Wesley.
|
MLA |
Defend I.T. : security by example.
Boston:
Addison-Wesley,
2004.
|
Harvard |
2004.
Defend I.T. : security by example.
Addison-Wesley,
|
Chicago |
Defend I.T. : security by example.
Addison-Wesley,
2004.
|
|
|
Designing network security |
APA |
(2004).
Designing network security,
Indianapolis, Indiana:
Cisco Press.
|
MLA |
Designing network security.
Indianapolis, Indiana:
Cisco Press,
2004.
|
Harvard |
2004.
Designing network security.
Cisco Press,
|
Chicago |
Designing network security.
Cisco Press,
2004.
|
|
|
Cisco network security troubleshooting handbook |
APA |
(2006).
Cisco network security troubleshooting handbook,
Indianapolis, Indiana:
Cisco Press.
|
MLA |
Cisco network security troubleshooting handbook.
Indianapolis, Indiana:
Cisco Press,
2006.
|
Harvard |
2006.
Cisco network security troubleshooting handbook.
Cisco Press,
|
Chicago |
Cisco network security troubleshooting handbook.
Cisco Press,
2006.
|
|
|
A simple guide to security and privacy on your PC |
APA |
(2000).
A simple guide to security and privacy on your PC,
Harlow:
Prentice Hall.
|
MLA |
A simple guide to security and privacy on your PC.
Harlow:
Prentice Hall,
2000.
|
Harvard |
2000.
A simple guide to security and privacy on your PC.
Prentice Hall,
|
Chicago |
A simple guide to security and privacy on your PC.
Prentice Hall,
2000.
|
|
|
Microsoft Windows XP networking and security: inside out: also covers Windows
2000 |
APA |
(2006).
Microsoft Windows XP networking and security: inside out: also covers
Windows 2000,
New Delhi:
Prentice Hall of India.
|
MLA |
Microsoft Windows XP networking and security: inside out: also covers
Windows 2000.
New Delhi:
Prentice Hall of India,
2006.
|
Harvard |
2006.
Microsoft Windows XP networking and security: inside out: also covers Windows
2000.
Prentice Hall of India,
|
Chicago |
Microsoft Windows XP networking and security: inside out: also covers Windows
2000.
Prentice Hall of India,
2006.
|
|
|
Network security: a practical approach |
APA |
(2006).
Network security: a practical approach,
New Delhi:
Elsevier.
|
MLA |
Network security: a practical approach.
New Delhi:
Elsevier,
2006.
|
Harvard |
2006.
Network security: a practical approach.
Elsevier,
|
Chicago |
Network security: a practical approach.
Elsevier,
2006.
|
|
|
IT governance: a manager's guide to data security and BS 7799-ISO 17799
|
APA |
(2005).
IT governance: a manager's guide to data security and BS 7799-ISO 17799
,
London:
Kogan Page.
|
MLA |
IT governance: a manager's guide to data security and BS 7799-ISO 17799
.
London:
Kogan Page,
2005.
|
Harvard |
2005.
IT governance: a manager's guide to data security and BS 7799-ISO 17799.
Kogan Page,
|
Chicago |
IT governance: a manager's guide to data security and BS 7799-ISO 17799.
Kogan Page,
2005.
|
|
|
Internet security: a jumpstart for systems administrators and IT managers
|
APA |
(2003).
Internet security: a jumpstart for systems administrators and IT managers
,
New Delhi:
Digital Press.
|
MLA |
Internet security: a jumpstart for systems administrators and IT managers
.
New Delhi:
Digital Press,
2003.
|
Harvard |
2003.
Internet security: a jumpstart for systems administrators and IT managers.
Digital Press,
|
Chicago |
Internet security: a jumpstart for systems administrators and IT managers.
Digital Press,
2003.
|
|
|
Network security: current status and future directions |
APA |
(2007).
Network security: current status and future directions,
Hoboken, N.J.:
John Wiley & Sons.
|
MLA |
Network security: current status and future directions.
Hoboken, N.J.:
John Wiley & Sons,
2007.
|
Harvard |
2007.
Network security: current status and future directions.
John Wiley & Sons,
|
Chicago |
Network security: current status and future directions.
John Wiley & Sons,
2007.
|
|
|
Cryptography and network security: principles and practice |
APA |
(2006).
Cryptography and network security: principles and practice,
Upper Saddle River, New Jersey:
Pearson Prentice Hall.
|
MLA |
Cryptography and network security: principles and practice.
Upper Saddle River, New Jersey:
Pearson Prentice Hall,
2006.
|
Harvard |
2006.
Cryptography and network security: principles and practice.
Pearson Prentice Hall,
|
Chicago |
Cryptography and network security: principles and practice.
Pearson Prentice Hall,
2006.
|
|
|
Cisco ASA, PIX, and FWSM firewall handbook |
APA |
(2008).
Cisco ASA, PIX, and FWSM firewall handbook,
Indianapolis, Indiana:
Cisco Press.
|
MLA |
Cisco ASA, PIX, and FWSM firewall handbook.
Indianapolis, Indiana:
Cisco Press,
2008.
|
Harvard |
2008.
Cisco ASA, PIX, and FWSM firewall handbook.
Cisco Press,
|
Chicago |
Cisco ASA, PIX, and FWSM firewall handbook.
Cisco Press,
2008.
|
|
|
Computer security: principles and practice
|
APA |
(2008).
Computer security: principles and practice
,
Upper Saddle River, NJ.:
Pearson/Prentice Hall.
|
MLA |
Computer security: principles and practice
.
Upper Saddle River, NJ.:
Pearson/Prentice Hall,
2008.
|
Harvard |
2008.
Computer security: principles and practice
.
Pearson/Prentice Hall,
|
Chicago |
Computer security: principles and practice
.
Pearson/Prentice Hall,
2008.
|
|
|
Information security and cyber laws |
APA |
(2010).
Information security and cyber laws,
New Delhi:
S. K. Kataria & Sons.
|
MLA |
Information security and cyber laws.
New Delhi:
S. K. Kataria & Sons,
2010.
|
Harvard |
2010.
Information security and cyber laws.
S. K. Kataria & Sons,
|
Chicago |
Information security and cyber laws.
S. K. Kataria & Sons,
2010.
|
|
|
Information security and cyber laws |
APA |
(2011).
Information security and cyber laws,
New Delhi:
S. K. Kataria & Sons.
|
MLA |
Information security and cyber laws.
New Delhi:
S. K. Kataria & Sons,
2011.
|
Harvard |
2011.
Information security and cyber laws.
S. K. Kataria & Sons,
|
Chicago |
Information security and cyber laws.
S. K. Kataria & Sons,
2011.
|
|
|
The art of enterprise information architecture: a systems-based approach for
unlocking business insight |
APA |
(2010).
The art of enterprise information architecture: a systems-based approach
for unlocking business insight,
Upper Saddle River, NJ:
IBM Press, Pearson.
|
MLA |
The art of enterprise information architecture: a systems-based approach
for unlocking business insight.
Upper Saddle River, NJ:
IBM Press, Pearson,
2010.
|
Harvard |
2010.
The art of enterprise information architecture: a systems-based approach for
unlocking business insight.
IBM Press, Pearson,
|
Chicago |
The art of enterprise information architecture: a systems-based approach for
unlocking business insight.
IBM Press, Pearson,
2010.
|
|
|
Business data networks and security |
APA |
(2013).
Business data networks and security,
Boston:
Pearson .
|
MLA |
Business data networks and security.
Boston:
Pearson ,
2013.
|
Harvard |
2013.
Business data networks and security.
Pearson ,
|
Chicago |
Business data networks and security.
Pearson ,
2013.
|
|
|
Principles of information security |
APA |
(2013).
Principles of information security,
Delhi:
Cengage Learning India.
|
MLA |
Principles of information security.
Delhi:
Cengage Learning India,
2013.
|
Harvard |
2013.
Principles of information security.
Cengage Learning India,
|
Chicago |
Principles of information security.
Cengage Learning India,
2013.
|
|
|
Network security |
APA |
(2012).
Network security,
New Delhi:
S. K. Kataria & Sons.
|
MLA |
Network security.
New Delhi:
S. K. Kataria & Sons,
2012.
|
Harvard |
2012.
Network security.
S. K. Kataria & Sons,
|
Chicago |
Network security.
S. K. Kataria & Sons,
2012.
|
|
|
Network security : private communication in a public world |
APA |
(2013).
Network security : private communication in a public world,
New Delhi:
PHI Learning Private Limited.
|
MLA |
Network security : private communication in a public world.
New Delhi:
PHI Learning Private Limited,
2013.
|
Harvard |
2013.
Network security : private communication in a public world.
PHI Learning Private Limited,
|
Chicago |
Network security : private communication in a public world.
PHI Learning Private Limited,
2013.
|
|
|
Information security and cyber laws |
APA |
(2014).
Information security and cyber laws,
New Delhi:
Technical Publications.
|
MLA |
Information security and cyber laws.
New Delhi:
Technical Publications,
2014.
|
Harvard |
2014.
Information security and cyber laws.
Technical Publications,
|
Chicago |
Information security and cyber laws.
Technical Publications,
2014.
|
|
|
Computer and information security handbook |
APA |
(2013).
Computer and information security handbook,
Amsterdam:
Elsevier.
|
MLA |
Computer and information security handbook.
Amsterdam:
Elsevier,
2013.
|
Harvard |
2013.
Computer and information security handbook.
Elsevier,
|
Chicago |
Computer and information security handbook.
Elsevier,
2013.
|
|
|
Network security essentials : applications and standards |
APA |
(2014).
Network security essentials : applications and standards,
Harlow:
Pearson Education Limited.
|
MLA |
Network security essentials : applications and standards.
Harlow:
Pearson Education Limited,
2014.
|
Harvard |
2014.
Network security essentials : applications and standards.
Pearson Education Limited,
|
Chicago |
Network security essentials : applications and standards.
Pearson Education Limited,
2014.
|
|
|
Security + guide to network security fundamentals |
APA |
(2012).
Security + guide to network security fundamentals,
Australia:
Course Technology.
|
MLA |
Security + guide to network security fundamentals.
Australia:
Course Technology,
2012.
|
Harvard |
2012.
Security + guide to network security fundamentals.
Course Technology,
|
Chicago |
Security + guide to network security fundamentals.
Course Technology,
2012.
|
|
|
Securing the virtual environment : how to defend the enterprise against attack
|
APA |
(2012).
Securing the virtual environment : how to defend the enterprise against
attack,
New Delhi:
Wiley India Pvt. Ltd.
|
MLA |
Securing the virtual environment : how to defend the enterprise against
attack.
New Delhi:
Wiley India Pvt. Ltd,
2012.
|
Harvard |
2012.
Securing the virtual environment : how to defend the enterprise against attack
.
Wiley India Pvt. Ltd,
|
Chicago |
Securing the virtual environment : how to defend the enterprise against attack
.
Wiley India Pvt. Ltd,
2012.
|
|
|
CompTIA security + (Exam SYO-301) : training kit |
APA |
(2014).
CompTIA security + (Exam SYO-301) : training kit,
New Delhi:
PHI Learning Private Limited.
|
MLA |
CompTIA security + (Exam SYO-301) : training kit.
New Delhi:
PHI Learning Private Limited,
2014.
|
Harvard |
2014.
CompTIA security + (Exam SYO-301) : training kit.
PHI Learning Private Limited,
|
Chicago |
CompTIA security + (Exam SYO-301) : training kit.
PHI Learning Private Limited,
2014.
|
|
|
Network security |
APA |
(2013).
Network security,
New Delhi:
S. K. Kataria & Sons.
|
MLA |
Network security.
New Delhi:
S. K. Kataria & Sons,
2013.
|
Harvard |
2013.
Network security.
S. K. Kataria & Sons,
|
Chicago |
Network security.
S. K. Kataria & Sons,
2013.
|
|
|
Computer security: principles and practice
|
APA |
(2015).
Computer security: principles and practice
,
Boston:
Pearson Education Limited.
|
MLA |
Computer security: principles and practice
.
Boston:
Pearson Education Limited,
2015.
|
Harvard |
2015.
Computer security: principles and practice
.
Pearson Education Limited,
|
Chicago |
Computer security: principles and practice
.
Pearson Education Limited,
2015.
|
|
|
Cryptography and network security: principles and practice |
APA |
(2014).
Cryptography and network security: principles and practice,
Boston:
Pearson Education Limited.
|
MLA |
Cryptography and network security: principles and practice.
Boston:
Pearson Education Limited,
2014.
|
Harvard |
2014.
Cryptography and network security: principles and practice.
Pearson Education Limited,
|
Chicago |
Cryptography and network security: principles and practice.
Pearson Education Limited,
2014.
|
|
|
Principles of information security |
APA |
(2016).
Principles of information security,
Boston:
Cengage Learning.
|
MLA |
Principles of information security.
Boston:
Cengage Learning,
2016.
|
Harvard |
2016.
Principles of information security.
Cengage Learning,
|
Chicago |
Principles of information security.
Cengage Learning,
2016.
|
|
|
Computer security fundamentals |
APA |
(2016).
Computer security fundamentals,
Indianapolis:
Pearson Education.
|
MLA |
Computer security fundamentals.
Indianapolis:
Pearson Education,
2016.
|
Harvard |
2016.
Computer security fundamentals.
Pearson Education,
|
Chicago |
Computer security fundamentals.
Pearson Education,
2016.
|
|
|
Security + guide to network security fundamentals |
APA |
(2018).
Security + guide to network security fundamentals,
Australia:
Cengage Learning.
|
MLA |
Security + guide to network security fundamentals.
Australia:
Cengage Learning,
2018.
|
Harvard |
2018.
Security + guide to network security fundamentals.
Cengage Learning,
|
Chicago |
Security + guide to network security fundamentals.
Cengage Learning,
2018.
|
|
|
Security + guide to network security fundamentals |
APA |
(2012).
Security + guide to network security fundamentals,
Australia:
Course Technology.
|
MLA |
Security + guide to network security fundamentals.
Australia:
Course Technology,
2012.
|
Harvard |
2012.
Security + guide to network security fundamentals.
Course Technology,
|
Chicago |
Security + guide to network security fundamentals.
Course Technology,
2012.
|
|
|
Cryptography and network security: principles and practice |
APA |
(2023).
Cryptography and network security: principles and practice,
Boston:
Pearson Education Limited.
|
MLA |
Cryptography and network security: principles and practice.
Boston:
Pearson Education Limited,
2023.
|
Harvard |
2023.
Cryptography and network security: principles and practice.
Pearson Education Limited,
|
Chicago |
Cryptography and network security: principles and practice.
Pearson Education Limited,
2023.
|