Philadelphia University - Library & Information Resources

ßÊÇÈ/ ãÑÌÚ

Practical unix and internet security

APA 

(1996). Practical unix and internet security, Bonn: O'Reilly and associates, Inc..

MLA 

Practical unix and internet security. Bonn: O'Reilly and associates, Inc., 1996.

Harvard 

1996. Practical unix and internet security. O'Reilly and associates, Inc.,

Chicago 

Practical unix and internet security. O'Reilly and associates, Inc., 1996.

ßÊÇÈ/ ãÑÌÚ

Computer security handbook

APA 

(1988). Computer security handbook, New York: Macmillan.

MLA 

Computer security handbook. New York: Macmillan, 1988.

Harvard 

1988. Computer security handbook. Macmillan,

Chicago 

Computer security handbook. Macmillan, 1988.

ßÊÇÈ/ ãÑÌÚ

Computer security basics

APA 

(1991). Computer security basics, Sebastopol: O'Reilly & Associates.

MLA 

Computer security basics. Sebastopol: O'Reilly & Associates, 1991.

Harvard 

1991. Computer security basics. O'Reilly & Associates,

Chicago 

Computer security basics. O'Reilly & Associates, 1991.

ßÊÇÈ/ ãÑÌÚ

Unix system security: how to protect your data and prevent intruders

APA 

(1990). Unix system security: how to protect your data and prevent intruders, Reading, Massachusetts: Addison-Wesley.

MLA 

Unix system security: how to protect your data and prevent intruders. Reading, Massachusetts: Addison-Wesley, 1990.

Harvard 

1990. Unix system security: how to protect your data and prevent intruders. Addison-Wesley,

Chicago 

Unix system security: how to protect your data and prevent intruders. Addison-Wesley, 1990.

ßÊÇÈ/ ãÑÌÚ

applied cryptography: protocols, algorithms, and source code in C

APA 

(1996). applied cryptography: protocols, algorithms, and source code in C, N.Y: John Wiley & Sons.

MLA 

applied cryptography: protocols, algorithms, and source code in C. N.Y: John Wiley & Sons, 1996.

Harvard 

1996. applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons,

Chicago 

applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons, 1996.

ßÊÇÈ/ ãÑÌÚ

The stephen cobb complete book of PC and LAN security

APA 

(1990). The stephen cobb complete book of PC and LAN security, N.Y: Windcrest.

MLA 

The stephen cobb complete book of PC and LAN security. N.Y: Windcrest, 1990.

Harvard 

1990. The stephen cobb complete book of PC and LAN security. Windcrest,

Chicago 

The stephen cobb complete book of PC and LAN security. Windcrest, 1990.

ßÊÇÈ/ ãÑÌÚ

Unix security for the organization

APA 

(1994). Unix security for the organization, Indianapolis: Sams publishing.

MLA 

Unix security for the organization. Indianapolis: Sams publishing, 1994.

Harvard 

1994. Unix security for the organization. Sams publishing,

Chicago 

Unix security for the organization. Sams publishing, 1994.

ßÊÇÈ/ ãÑÌÚ

Java security

APA 

(1996). Java security, New York: John Wiley & Sons.

MLA 

Java security. New York: John Wiley & Sons, 1996.

Harvard 

1996. Java security. John Wiley & Sons,

Chicago 

Java security. John Wiley & Sons, 1996.

ßÊÇÈ/ ãÑÌÚ

Fundamentals of computer security technology

APA 

(1994). Fundamentals of computer security technology, New Jersey: Prentice Hall.

MLA 

Fundamentals of computer security technology. New Jersey: Prentice Hall, 1994.

Harvard 

1994. Fundamentals of computer security technology. Prentice Hall,

Chicago 

Fundamentals of computer security technology. Prentice Hall, 1994.

ßÊÇÈ/ ãÑÌÚ

Security in computing

APA 

(1997). Security in computing, Upper Saddle River, New Jersey: Prentice Hall.

MLA 

Security in computing. Upper Saddle River, New Jersey: Prentice Hall, 1997.

Harvard 

1997. Security in computing. Prentice Hall,

Chicago 

Security in computing. Prentice Hall, 1997.

ßÊÇÈ/ ãÑÌÚ

Cryptography and network security : principles and practice

APA 

(1998). Cryptography and network security : principles and practice, Upper Saddle River, New Jersey: Prentice Hall.

MLA 

Cryptography and network security : principles and practice. Upper Saddle River, New Jersey: Prentice Hall, 1998.

Harvard 

1998. Cryptography and network security : principles and practice. Prentice Hall,

Chicago 

Cryptography and network security : principles and practice. Prentice Hall, 1998.

ßÊÇÈ/ ãÑÌÚ

Introduction to data security and controls

APA 

(1982). Introduction to data security and controls, Wellesley, Massachusetts: Q.E.D. Information Science, INC..

MLA 

Introduction to data security and controls. Wellesley, Massachusetts: Q.E.D. Information Science, INC., 1982.

Harvard 

1982. Introduction to data security and controls. Q.E.D. Information Science, INC.,

Chicago 

Introduction to data security and controls. Q.E.D. Information Science, INC., 1982.

ßÊÇÈ/ ãÑÌÚ

Information and communications security: conference proceedings held in Beijing, China, 11 - 14, November, 1997

APA 

(1997). Information and communications security: conference proceedings held in Beijing, China, 11 - 14, November, 1997, Berlin: Springer - Verlag.

MLA 

Information and communications security: conference proceedings held in Beijing, China, 11 - 14, November, 1997. Berlin: Springer - Verlag, 1997.

Harvard 

1997. Information and communications security: conference proceedings held in Beijing, China, 11 - 14, November, 1997. Springer - Verlag,

Chicago 

Information and communications security: conference proceedings held in Beijing, China, 11 - 14, November, 1997. Springer - Verlag, 1997.

ßÊÇÈ/ ãÑÌÚ

Security protocols: workshop proceedings held in Cambridge, United Kingdom, 10 - 12 April, 1996

APA 

(1997). Security protocols: workshop proceedings held in Cambridge, United Kingdom, 10 - 12 April, 1996, Berlin: Springer - Verlag.

MLA 

Security protocols: workshop proceedings held in Cambridge, United Kingdom, 10 - 12 April, 1996. Berlin: Springer - Verlag, 1997.

Harvard 

1997. Security protocols: workshop proceedings held in Cambridge, United Kingdom, 10 - 12 April, 1996. Springer - Verlag,

Chicago 

Security protocols: workshop proceedings held in Cambridge, United Kingdom, 10 - 12 April, 1996. Springer - Verlag, 1997.

ßÊÇÈ/ ãÑÌÚ

Information security and privacy: conference proceedings held in Brisbane, Australia, 13 - 15 July, 1998

APA 

(1998). Information security and privacy: conference proceedings held in Brisbane, Australia, 13 - 15 July, 1998, Berlin: Springer - Verlag.

MLA 

Information security and privacy: conference proceedings held in Brisbane, Australia, 13 - 15 July, 1998. Berlin: Springer - Verlag, 1998.

Harvard 

1998. Information security and privacy: conference proceedings held in Brisbane, Australia, 13 - 15 July, 1998. Springer - Verlag,

Chicago 

Information security and privacy: conference proceedings held in Brisbane, Australia, 13 - 15 July, 1998. Springer - Verlag, 1998.

ßÊÇÈ/ ãÑÌÚ

Digital signature schemes: general framework and fail-stop signatures

APA 

(1996). Digital signature schemes: general framework and fail-stop signatures, Berlin: Springer - Verlag.

MLA 

Digital signature schemes: general framework and fail-stop signatures. Berlin: Springer - Verlag, 1996.

Harvard 

1996. Digital signature schemes: general framework and fail-stop signatures. Springer - Verlag,

Chicago 

Digital signature schemes: general framework and fail-stop signatures. Springer - Verlag, 1996.

ßÊÇÈ/ ãÑÌÚ

Hacking exposed: network security, secrets and solutions

APA 

(2001). Hacking exposed: network security, secrets and solutions, Berkeley: Osborne/ McGraw - Hill.

MLA 

Hacking exposed: network security, secrets and solutions. Berkeley: Osborne/ McGraw - Hill, 2001.

Harvard 

2001. Hacking exposed: network security, secrets and solutions. Osborne/ McGraw - Hill,

Chicago 

Hacking exposed: network security, secrets and solutions. Osborne/ McGraw - Hill, 2001.

ßÊÇÈ/ ãÑÌÚ

MCSE: windows 2000 network security design: exam notes

APA 

(2001). MCSE: windows 2000 network security design: exam notes, San Francisco: SYBEX.

MLA 

MCSE: windows 2000 network security design: exam notes. San Francisco: SYBEX, 2001.

Harvard 

2001. MCSE: windows 2000 network security design: exam notes. SYBEX,

Chicago 

MCSE: windows 2000 network security design: exam notes. SYBEX, 2001.

ßÊÇÈ/ ãÑÌÚ

Windows 2000 security handbook

APA 

(2001). Windows 2000 security handbook, Berkeley, California: Osborne/ McGraw - Hill.

MLA 

Windows 2000 security handbook. Berkeley, California: Osborne/ McGraw - Hill, 2001.

Harvard 

2001. Windows 2000 security handbook. Osborne/ McGraw - Hill,

Chicago 

Windows 2000 security handbook. Osborne/ McGraw - Hill, 2001.

ßÊÇÈ/ ãÑÌÚ

Java security handbook

APA 

(2000). Java security handbook, Indianapolis, Indiana: SAMS.

MLA 

Java security handbook. Indianapolis, Indiana: SAMS, 2000.

Harvard 

2000. Java security handbook. SAMS,

Chicago 

Java security handbook. SAMS, 2000.

ßÊÇÈ/ ãÑÌÚ

Windows 2000 user management

APA 

(2000). Windows 2000 user management, Indianapolis, Indiana: New Riders.

MLA 

Windows 2000 user management. Indianapolis, Indiana: New Riders, 2000.

Harvard 

2000. Windows 2000 user management. New Riders,

Chicago 

Windows 2000 user management. New Riders, 2000.

ßÊÇÈ/ ãÑÌÚ

Hacker attack

APA 

(2000). Hacker attack, San Francisco: SYBEX.

MLA 

Hacker attack. San Francisco: SYBEX, 2000.

Harvard 

2000. Hacker attack. SYBEX,

Chicago 

Hacker attack. SYBEX, 2000.

ßÊÇÈ/ ãÑÌÚ

Protecting your web site with firewalls

APA 

(1997). Protecting your web site with firewalls, Upper Saddle River, New Jersey: Prentice - Hall.

MLA 

Protecting your web site with firewalls. Upper Saddle River, New Jersey: Prentice - Hall, 1997.

Harvard 

1997. Protecting your web site with firewalls. Prentice - Hall,

Chicago 

Protecting your web site with firewalls. Prentice - Hall, 1997.

ßÊÇÈ/ ãÑÌÚ

Firewalls : a complete guide

APA 

(2000). Firewalls : a complete guide, New York: McGraw - Hill.

MLA 

Firewalls : a complete guide. New York: McGraw - Hill, 2000.

Harvard 

2000. Firewalls : a complete guide. McGraw - Hill,

Chicago 

Firewalls : a complete guide. McGraw - Hill, 2000.

ßÊÇÈ/ ãÑÌÚ

Practical firewalls

APA 

(2000). Practical firewalls, Indianapolis, Indiana: Que.

MLA 

Practical firewalls. Indianapolis, Indiana: Que, 2000.

Harvard 

2000. Practical firewalls. Que,

Chicago 

Practical firewalls. Que, 2000.

ßÊÇÈ/ ãÑÌÚ

Developing secure applications with Visual Basic

APA 

(2000). Developing secure applications with Visual Basic, Indianapolis, Indiana: SAMS.

MLA 

Developing secure applications with Visual Basic. Indianapolis, Indiana: SAMS, 2000.

Harvard 

2000. Developing secure applications with Visual Basic. SAMS,

Chicago 

Developing secure applications with Visual Basic. SAMS, 2000.

ßÊÇÈ/ ãÑÌÚ

Database nation : the death of privacy in the 21st century

APA 

(2000). Database nation : the death of privacy in the 21st century, Beijing: O'Reilly.

MLA 

Database nation : the death of privacy in the 21st century. Beijing: O'Reilly, 2000.

Harvard 

2000. Database nation : the death of privacy in the 21st century. O'Reilly,

Chicago 

Database nation : the death of privacy in the 21st century. O'Reilly, 2000.

ßÊÇÈ/ ãÑÌÚ

Decrypted secrets: methods and maxims of cryptography

APA 

(2000). Decrypted secrets: methods and maxims of cryptography, Berlin: Springer - Verlag.

MLA 

Decrypted secrets: methods and maxims of cryptography. Berlin: Springer - Verlag, 2000.

Harvard 

2000. Decrypted secrets: methods and maxims of cryptography. Springer - Verlag,

Chicago 

Decrypted secrets: methods and maxims of cryptography. Springer - Verlag, 2000.

ßÊÇÈ/ ãÑÌÚ

Information hiding: first international workshop, Cambridge, U.K., May 30 - June 1, 1996: Proceedings

APA 

(1996). Information hiding: first international workshop, Cambridge, U.K., May 30 - June 1, 1996: Proceedings, Berlin: Springer.

MLA 

Information hiding: first international workshop, Cambridge, U.K., May 30 - June 1, 1996: Proceedings. Berlin: Springer, 1996.

Harvard 

1996. Information hiding: first international workshop, Cambridge, U.K., May 30 - June 1, 1996: Proceedings. Springer,

Chicago 

Information hiding: first international workshop, Cambridge, U.K., May 30 - June 1, 1996: Proceedings. Springer, 1996.

ßÊÇÈ/ ãÑÌÚ

Advances in cryptology, 1981-1997: electronic proceedings and index of the crypto and Eurocrypt conferences 1981-1997

APA 

(1998). Advances in cryptology, 1981-1997: electronic proceedings and index of the crypto and Eurocrypt conferences 1981-1997, Berlin: Springer.

MLA 

Advances in cryptology, 1981-1997: electronic proceedings and index of the crypto and Eurocrypt conferences 1981-1997. Berlin: Springer, 1998.

Harvard 

1998. Advances in cryptology, 1981-1997: electronic proceedings and index of the crypto and Eurocrypt conferences 1981-1997. Springer,

Chicago 

Advances in cryptology, 1981-1997: electronic proceedings and index of the crypto and Eurocrypt conferences 1981-1997. Springer, 1998.

ßÊÇÈ/ ãÑÌÚ

Configuring Windows 2000 server security

APA 

(2000). Configuring Windows 2000 server security, Rockland, MA: Syngress Media.

MLA 

Configuring Windows 2000 server security. Rockland, MA: Syngress Media, 2000.

Harvard 

2000. Configuring Windows 2000 server security. Syngress Media,

Chicago 

Configuring Windows 2000 server security. Syngress Media, 2000.

ßÊÇÈ/ ãÑÌÚ

IT manager's guide to virtual private networks

APA 

(1999). IT manager's guide to virtual private networks, New York: McGraw - Hill.

MLA 

IT manager's guide to virtual private networks. New York: McGraw - Hill, 1999.

Harvard 

1999. IT manager's guide to virtual private networks. McGraw - Hill,

Chicago 

IT manager's guide to virtual private networks. McGraw - Hill, 1999.

ßÊÇÈ/ ãÑÌÚ

Cisco network security

APA 

(2001). Cisco network security, Upper Saddle River, New Jersey: Prentice - Hall.

MLA 

Cisco network security. Upper Saddle River, New Jersey: Prentice - Hall, 2001.

Harvard 

2001. Cisco network security. Prentice - Hall,

Chicago 

Cisco network security. Prentice - Hall, 2001.

ßÊÇÈ/ ãÑÌÚ

Security complete

APA 

(2001). Security complete, San Francisco: SYBEX.

MLA 

Security complete. San Francisco: SYBEX, 2001.

Harvard 

2001. Security complete. SYBEX,

Chicago 

Security complete. SYBEX, 2001.

ßÊÇÈ/ ãÑÌÚ

Modern cryptography, probabilistic proofs and pseudorandomness

APA 

(1999). Modern cryptography, probabilistic proofs and pseudorandomness, Berlin: Springer.

MLA 

Modern cryptography, probabilistic proofs and pseudorandomness. Berlin: Springer, 1999.

Harvard 

1999. Modern cryptography, probabilistic proofs and pseudorandomness. Springer,

Chicago 

Modern cryptography, probabilistic proofs and pseudorandomness. Springer, 1999.

ßÊÇÈ/ ãÑÌÚ

Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998

APA 

(2000). Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998, Berlin: Springer.

MLA 

Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998. Berlin: Springer, 2000.

Harvard 

2000. Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998. Springer,

Chicago 

Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998. Springer, 2000.

ßÊÇÈ/ ãÑÌÚ

Lectures on data security: modern cryptology in theory and practice

APA 

(1999). Lectures on data security: modern cryptology in theory and practice, Berlin: Springer.

MLA 

Lectures on data security: modern cryptology in theory and practice. Berlin: Springer, 1999.

Harvard 

1999. Lectures on data security: modern cryptology in theory and practice. Springer,

Chicago 

Lectures on data security: modern cryptology in theory and practice. Springer, 1999.

ßÊÇÈ/ ãÑÌÚ

Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings

APA 

(1997). Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings, Berlin: Springer.

MLA 

Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings. Berlin: Springer, 1997.

Harvard 

1997. Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings. Springer,

Chicago 

Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings. Springer, 1997.

ßÊÇÈ/ ãÑÌÚ

Information security: first international workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997: Proceedings

APA 

(1998). Information security: first international workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997: Proceedings, Berlin: Springer.

MLA 

Information security: first international workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997: Proceedings. Berlin: Springer, 1998.

Harvard 

1998. Information security: first international workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997: Proceedings. Springer,

Chicago 

Information security: first international workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997: Proceedings. Springer, 1998.

ßÊÇÈ/ ãÑÌÚ

Information security and privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999: Proceedings

APA 

(1999). Information security and privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999: Proceedings, Berlin: Springer.

MLA 

Information security and privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999: Proceedings. Berlin: Springer, 1999.

Harvard 

1999. Information security and privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999: Proceedings. Springer,

Chicago 

Information security and privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999: Proceedings. Springer, 1999.

ßÊÇÈ/ ãÑÌÚ

Selected areas in cryptography: 5th annual international workshop, SAC'98, Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings

APA 

(1998). Selected areas in cryptography: 5th annual international workshop, SAC'98, Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings, Berlin: Springer.

MLA 

Selected areas in cryptography: 5th annual international workshop, SAC'98, Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings. Berlin: Springer, 1998.

Harvard 

1998. Selected areas in cryptography: 5th annual international workshop, SAC'98, Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings. Springer,

Chicago 

Selected areas in cryptography: 5th annual international workshop, SAC'98, Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings. Springer, 1998.

ßÊÇÈ/ ãÑÌÚ

State of the art in applied cryptography:"course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures

APA 

(1998). State of the art in applied cryptography:"course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures , Berlin: Springer.

MLA 

State of the art in applied cryptography:"course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures . Berlin: Springer, 1998.

Harvard 

1998. State of the art in applied cryptography:"course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures. Springer,

Chicago 

State of the art in applied cryptography:"course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures. Springer, 1998.

ßÊÇÈ/ ãÑÌÚ

Public key cryptography: second international workshop on practice and theory in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc

APA 

(1999). Public key cryptography: second international workshop on practice and theory in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc, Berlin: Springer.

MLA 

Public key cryptography: second international workshop on practice and theory in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc. Berlin: Springer, 1999.

Harvard 

1999. Public key cryptography: second international workshop on practice and theory in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc. Springer,

Chicago 

Public key cryptography: second international workshop on practice and theory in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc. Springer, 1999.

ßÊÇÈ/ ãÑÌÚ

Information hiding:"second international workshop, IH'98: Portland, Oregon, USA, April 14-17, 1998: Proceedings

APA 

(1998). Information hiding:"second international workshop, IH'98: Portland, Oregon, USA, April 14-17, 1998: Proceedings, Berlin: Springer.

MLA 

Information hiding:"second international workshop, IH'98: Portland, Oregon, USA, April 14-17, 1998: Proceedings. Berlin: Springer, 1998.

Harvard 

1998. Information hiding:"second international workshop, IH'98: Portland, Oregon, USA, April 14-17, 1998: Proceedings. Springer,

Chicago 

Information hiding:"second international workshop, IH'98: Portland, Oregon, USA, April 14-17, 1998: Proceedings. Springer, 1998.

ßÊÇÈ/ ãÑÌÚ

Security protocols: 6th international workshop, Cambridge, UK, April 15-17, 1998: proceedings

APA 

(1999). Security protocols: 6th international workshop, Cambridge, UK, April 15-17, 1998: proceedings, Berlin: Springer.

MLA 

Security protocols: 6th international workshop, Cambridge, UK, April 15-17, 1998: proceedings. Berlin: Springer, 1999.

Harvard 

1999. Security protocols: 6th international workshop, Cambridge, UK, April 15-17, 1998: proceedings. Springer,

Chicago 

Security protocols: 6th international workshop, Cambridge, UK, April 15-17, 1998: proceedings. Springer, 1999.

ßÊÇÈ/ ãÑÌÚ

Maximum Windows 2000 security

APA 

(2002). Maximum Windows 2000 security, Indianapolis, Indiana: Sams.

MLA 

Maximum Windows 2000 security. Indianapolis, Indiana: Sams, 2002.

Harvard 

2002. Maximum Windows 2000 security. Sams,

Chicago 

Maximum Windows 2000 security. Sams, 2002.

ßÊÇÈ/ ãÑÌÚ

Maximum security

APA 

(2001). Maximum security, Indianapolis, Indiana: Sams.

MLA 

Maximum security. Indianapolis, Indiana: Sams, 2001.

Harvard 

2001. Maximum security. Sams,

Chicago 

Maximum security. Sams, 2001.

ßÊÇÈ/ ãÑÌÚ

.NET framework security

APA 

(2002). .NET framework security, Boston: Addison - Wesley.

MLA 

.NET framework security. Boston: Addison - Wesley, 2002.

Harvard 

2002. .NET framework security. Addison - Wesley,

Chicago 

.NET framework security. Addison - Wesley, 2002.

ßÊÇÈ/ ãÑÌÚ

Information security architecture: an integrated approach to security in the organization

APA 

(2000). Information security architecture: an integrated approach to security in the organization, Boca Raton: Auerbach.

MLA 

Information security architecture: an integrated approach to security in the organization. Boca Raton: Auerbach, 2000.

Harvard 

2000. Information security architecture: an integrated approach to security in the organization. Auerbach,

Chicago 

Information security architecture: an integrated approach to security in the organization. Auerbach, 2000.

ßÊÇÈ/ ãÑÌÚ

Information security risk analysis

APA 

(2001). Information security risk analysis, Boca Raton: Auerbach.

MLA 

Information security risk analysis. Boca Raton: Auerbach, 2001.

Harvard 

2001. Information security risk analysis. Auerbach,

Chicago 

Information security risk analysis. Auerbach, 2001.

ßÊÇÈ/ ãÑÌÚ

Security management: an introduction

APA 

(2002). Security management: an introduction, Upper Saddle River, New Jersey: Prentice-Hall.

MLA 

Security management: an introduction. Upper Saddle River, New Jersey: Prentice-Hall, 2002.

Harvard 

2002. Security management: an introduction. Prentice-Hall,

Chicago 

Security management: an introduction. Prentice-Hall, 2002.

ßÊÇÈ/ ãÑÌÚ

Security and privacy for e-business

APA 

(2001). Security and privacy for e-business, New York: John Wiley and Sons, Inc..

MLA 

Security and privacy for e-business. New York: John Wiley and Sons, Inc., 2001.

Harvard 

2001. Security and privacy for e-business. John Wiley and Sons, Inc.,

Chicago 

Security and privacy for e-business. John Wiley and Sons, Inc., 2001.

ãÔÑæÚ ÊÎÑÌ

Digital signature

APA 

(2002). Digital signature. (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ Philadelphia University).

MLA 

. Digital signature. ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ) Philadelphia University, 2002,

Harvard 

2002, Digital signature (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University).

Chicago 

"Digital signature." ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University, 2002.

ãÔÑæÚ ÊÎÑÌ

Investigation into : data and system security

APA 

(1997). Investigation into : data and system security. (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ Philadelphia University).

MLA 

. Investigation into : data and system security. ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ) Philadelphia University, 1997,

Harvard 

1997, Investigation into : data and system security (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University).

Chicago 

"Investigation into : data and system security." ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University, 1997.

ãÔÑæÚ ÊÎÑÌ

Encrypt message using RSA and El gamal schemes

APA 

(2003). Encrypt message using RSA and El gamal schemes. (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ Philadelphia University).

MLA 

. Encrypt message using RSA and El gamal schemes. ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ) Philadelphia University, 2003,

Harvard 

2003, Encrypt message using RSA and El gamal schemes (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University).

Chicago 

"Encrypt message using RSA and El gamal schemes." ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University, 2003.

ãÔÑæÚ ÊÎÑÌ

Identification method

APA 

([199-]). Identification method. (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ Philadelphia University).

MLA 

. Identification method. ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ) Philadelphia University, [199-],

Harvard 

[199-], Identification method (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University).

Chicago 

"Identification method." ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University, [199-].

ãÔÑæÚ ÊÎÑÌ

Juevara encryption method

APA 

(2002). Juevara encryption method. (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ Philadelphia University).

MLA 

. Juevara encryption method. ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ) Philadelphia University, 2002,

Harvard 

2002, Juevara encryption method (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University).

Chicago 

"Juevara encryption method." ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University, 2002.

ãÔÑæÚ ÊÎÑÌ

Encryption and decryption

APA 

(1999). Encryption and decryption. (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ Philadelphia University).

MLA 

. Encryption and decryption. ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ) Philadelphia University, 1999,

Harvard 

1999, Encryption and decryption (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University).

Chicago 

"Encryption and decryption." ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University, 1999.

ßÊÇÈ/ ãÑÌÚ

Security in computing

APA 

(2003). Security in computing, Upper Saddle River, New Jersey: Prentice Hall.

MLA 

Security in computing. Upper Saddle River, New Jersey: Prentice Hall, 2003.

Harvard 

2003. Security in computing. Prentice Hall,

Chicago 

Security in computing. Prentice Hall, 2003.

ßÊÇÈ/ ãÑÌÚ

How secure is your wireless network? safeguarding your Wi-Fi Lan

APA 

(2004). How secure is your wireless network? safeguarding your Wi-Fi Lan, Upper Saddle River, New Jersey: Prentice Hall.

MLA 

How secure is your wireless network? safeguarding your Wi-Fi Lan. Upper Saddle River, New Jersey: Prentice Hall, 2004.

Harvard 

2004. How secure is your wireless network? safeguarding your Wi-Fi Lan. Prentice Hall,

Chicago 

How secure is your wireless network? safeguarding your Wi-Fi Lan. Prentice Hall, 2004.

ßÊÇÈ/ ãÑÌÚ

PDA security: incorporating handhelds into the enterprise

APA 

(2003). PDA security: incorporating handhelds into the enterprise, New York: McGraw-Hill.

MLA 

PDA security: incorporating handhelds into the enterprise. New York: McGraw-Hill, 2003.

Harvard 

2003. PDA security: incorporating handhelds into the enterprise. McGraw-Hill,

Chicago 

PDA security: incorporating handhelds into the enterprise. McGraw-Hill, 2003.

ßÊÇÈ/ ãÑÌÚ

Wireless operational security

APA 

(2004). Wireless operational security, Amsterdam: Elsevier.

MLA 

Wireless operational security. Amsterdam: Elsevier, 2004.

Harvard 

2004. Wireless operational security. Elsevier,

Chicago 

Wireless operational security. Elsevier, 2004.

ßÊÇÈ/ ãÑÌÚ

Public key infrastructure: building trusted applications and web services

APA 

(2004). Public key infrastructure: building trusted applications and web services , Bocca Raton: Auerbach Publications.

MLA 

Public key infrastructure: building trusted applications and web services . Bocca Raton: Auerbach Publications, 2004.

Harvard 

2004. Public key infrastructure: building trusted applications and web services. Auerbach Publications,

Chicago 

Public key infrastructure: building trusted applications and web services. Auerbach Publications, 2004.

ßÊÇÈ/ ãÑÌÚ

Defend I.T. : security by example

APA 

(2004). Defend I.T. : security by example, Boston: Addison-Wesley.

MLA 

Defend I.T. : security by example. Boston: Addison-Wesley, 2004.

Harvard 

2004. Defend I.T. : security by example. Addison-Wesley,

Chicago 

Defend I.T. : security by example. Addison-Wesley, 2004.

ßÊÇÈ/ ãÑÌÚ

Designing network security

APA 

(2004). Designing network security, Indianapolis, Indiana: Cisco Press.

MLA 

Designing network security. Indianapolis, Indiana: Cisco Press, 2004.

Harvard 

2004. Designing network security. Cisco Press,

Chicago 

Designing network security. Cisco Press, 2004.

ßÊÇÈ/ ãÑÌÚ

Software forensics: collecting evidence from the scene of a digital crime

APA 

(2004). Software forensics: collecting evidence from the scene of a digital crime , New York: McGraw-Hill.

MLA 

Software forensics: collecting evidence from the scene of a digital crime . New York: McGraw-Hill, 2004.

Harvard 

2004. Software forensics: collecting evidence from the scene of a digital crime. McGraw-Hill,

Chicago 

Software forensics: collecting evidence from the scene of a digital crime. McGraw-Hill, 2004.

ßÊÇÈ/ ãÑÌÚ

ISA server 2004 unleashed

APA 

(2006). ISA server 2004 unleashed, Indianapolis, Indiana: SAMS.

MLA 

ISA server 2004 unleashed. Indianapolis, Indiana: SAMS, 2006.

Harvard 

2006. ISA server 2004 unleashed. SAMS,

Chicago 

ISA server 2004 unleashed. SAMS, 2006.

ßÊÇÈ/ ãÑÌÚ

Cisco network security troubleshooting handbook

APA 

(2006). Cisco network security troubleshooting handbook, Indianapolis, Indiana: Cisco Press.

MLA 

Cisco network security troubleshooting handbook. Indianapolis, Indiana: Cisco Press, 2006.

Harvard 

2006. Cisco network security troubleshooting handbook. Cisco Press,

Chicago 

Cisco network security troubleshooting handbook. Cisco Press, 2006.

ßÊÇÈ/ ãÑÌÚ

Core security patterns: best practices and strategies for J2EE, Web services and identity management

APA 

(2005). Core security patterns: best practices and strategies for J2EE, Web services and identity management, Upper Saddle River, NJ: Prentice Hall.

MLA 

Core security patterns: best practices and strategies for J2EE, Web services and identity management. Upper Saddle River, NJ: Prentice Hall, 2005.

Harvard 

2005. Core security patterns: best practices and strategies for J2EE, Web services and identity management. Prentice Hall,

Chicago 

Core security patterns: best practices and strategies for J2EE, Web services and identity management. Prentice Hall, 2005.

ßÊÇÈ/ ãÑÌÚ

A simple guide to security and privacy on your PC

APA 

(2000). A simple guide to security and privacy on your PC, Harlow: Prentice Hall.

MLA 

A simple guide to security and privacy on your PC. Harlow: Prentice Hall, 2000.

Harvard 

2000. A simple guide to security and privacy on your PC. Prentice Hall,

Chicago 

A simple guide to security and privacy on your PC. Prentice Hall, 2000.

ßÊÇÈ/ ãÑÌÚ

Administering Windows Vista security: the big surprises

APA 

(2007). Administering Windows Vista security: the big surprises, Indianapolis, Indiana: Wiley Publishing, Inc..

MLA 

Administering Windows Vista security: the big surprises. Indianapolis, Indiana: Wiley Publishing, Inc., 2007.

Harvard 

2007. Administering Windows Vista security: the big surprises. Wiley Publishing, Inc.,

Chicago 

Administering Windows Vista security: the big surprises. Wiley Publishing, Inc., 2007.

ßÊÇÈ/ ãÑÌÚ

Hacking the Xbox: an introduction to reverse engineering

APA 

(2003). Hacking the Xbox: an introduction to reverse engineering, San Francisco: No Starch Press, Inc..

MLA 

Hacking the Xbox: an introduction to reverse engineering. San Francisco: No Starch Press, Inc., 2003.

Harvard 

2003. Hacking the Xbox: an introduction to reverse engineering. No Starch Press, Inc.,

Chicago 

Hacking the Xbox: an introduction to reverse engineering. No Starch Press, Inc., 2003.

ßÊÇÈ/ ãÑÌÚ

Reversing: secrets of reverse engineering

APA 

(2005). Reversing: secrets of reverse engineering, Indianapolis, Indiana: Wiley Publishing.

MLA 

Reversing: secrets of reverse engineering. Indianapolis, Indiana: Wiley Publishing, 2005.

Harvard 

2005. Reversing: secrets of reverse engineering. Wiley Publishing,

Chicago 

Reversing: secrets of reverse engineering. Wiley Publishing, 2005.

ßÊÇÈ/ ãÑÌÚ

Data protection and information lifecycle management

APA 

(2006). Data protection and information lifecycle management, Upper Saddle River, NJ: Prentice Hall.

MLA 

Data protection and information lifecycle management. Upper Saddle River, NJ: Prentice Hall, 2006.

Harvard 

2006. Data protection and information lifecycle management. Prentice Hall,

Chicago 

Data protection and information lifecycle management. Prentice Hall, 2006.

ßÊÇÈ/ ãÑÌÚ

Microsoft Windows XP networking and security: inside out: also covers Windows 2000

APA 

(2006). Microsoft Windows XP networking and security: inside out: also covers Windows 2000, New Delhi: Prentice Hall of India.

MLA 

Microsoft Windows XP networking and security: inside out: also covers Windows 2000. New Delhi: Prentice Hall of India, 2006.

Harvard 

2006. Microsoft Windows XP networking and security: inside out: also covers Windows 2000. Prentice Hall of India,

Chicago 

Microsoft Windows XP networking and security: inside out: also covers Windows 2000. Prentice Hall of India, 2006.

ßÊÇÈ/ ãÑÌÚ

Network security: a practical approach

APA 

(2006). Network security: a practical approach, New Delhi: Elsevier.

MLA 

Network security: a practical approach. New Delhi: Elsevier, 2006.

Harvard 

2006. Network security: a practical approach. Elsevier,

Chicago 

Network security: a practical approach. Elsevier, 2006.

ßÊÇÈ/ ãÑÌÚ

IT governance: a manager's guide to data security and BS 7799-ISO 17799

APA 

(2005). IT governance: a manager's guide to data security and BS 7799-ISO 17799 , London: Kogan Page.

MLA 

IT governance: a manager's guide to data security and BS 7799-ISO 17799 . London: Kogan Page, 2005.

Harvard 

2005. IT governance: a manager's guide to data security and BS 7799-ISO 17799. Kogan Page,

Chicago 

IT governance: a manager's guide to data security and BS 7799-ISO 17799. Kogan Page, 2005.

ßÊÇÈ/ ãÑÌÚ

Internet security: a jumpstart for systems administrators and IT managers

APA 

(2003). Internet security: a jumpstart for systems administrators and IT managers , New Delhi: Digital Press.

MLA 

Internet security: a jumpstart for systems administrators and IT managers . New Delhi: Digital Press, 2003.

Harvard 

2003. Internet security: a jumpstart for systems administrators and IT managers. Digital Press,

Chicago 

Internet security: a jumpstart for systems administrators and IT managers. Digital Press, 2003.

ßÊÇÈ/ ãÑÌÚ

Wireless security: models, threats, and solutions

APA 

(2006). Wireless security: models, threats, and solutions, New Delhi: Tata McGraw-Hill.

MLA 

Wireless security: models, threats, and solutions. New Delhi: Tata McGraw-Hill, 2006.

Harvard 

2006. Wireless security: models, threats, and solutions. Tata McGraw-Hill,

Chicago 

Wireless security: models, threats, and solutions. Tata McGraw-Hill, 2006.

ßÊÇÈ/ ãÑÌÚ

Network security: current status and future directions

APA 

(2007). Network security: current status and future directions, Hoboken, N.J.: John Wiley & Sons.

MLA 

Network security: current status and future directions. Hoboken, N.J.: John Wiley & Sons, 2007.

Harvard 

2007. Network security: current status and future directions. John Wiley & Sons,

Chicago 

Network security: current status and future directions. John Wiley & Sons, 2007.

ßÊÇÈ/ ãÑÌÚ

Cryptography and network security: principles and practice

APA 

(2006). Cryptography and network security: principles and practice, Upper Saddle River, New Jersey: Pearson Prentice Hall.

MLA 

Cryptography and network security: principles and practice. Upper Saddle River, New Jersey: Pearson Prentice Hall, 2006.

Harvard 

2006. Cryptography and network security: principles and practice. Pearson Prentice Hall,

Chicago 

Cryptography and network security: principles and practice. Pearson Prentice Hall, 2006.

ßÊÇÈ/ ãÑÌÚ

Cisco ASA, PIX, and FWSM firewall handbook

APA 

(2008). Cisco ASA, PIX, and FWSM firewall handbook, Indianapolis, Indiana: Cisco Press.

MLA 

Cisco ASA, PIX, and FWSM firewall handbook. Indianapolis, Indiana: Cisco Press, 2008.

Harvard 

2008. Cisco ASA, PIX, and FWSM firewall handbook. Cisco Press,

Chicago 

Cisco ASA, PIX, and FWSM firewall handbook. Cisco Press, 2008.

ßÊÇÈ/ ãÑÌÚ

The security development lifecycle : SDL, a process for developing demonstrably more secure software

APA 

(2006). The security development lifecycle : SDL, a process for developing demonstrably more secure software, Redmond, Washington: Microsoft Press.

MLA 

The security development lifecycle : SDL, a process for developing demonstrably more secure software. Redmond, Washington: Microsoft Press, 2006.

Harvard 

2006. The security development lifecycle : SDL, a process for developing demonstrably more secure software. Microsoft Press,

Chicago 

The security development lifecycle : SDL, a process for developing demonstrably more secure software. Microsoft Press, 2006.

ßÊÇÈ/ ãÑÌÚ

Software security : building security in

APA 

(2006). Software security : building security in, Upper Saddle River, NJ : Addison-Wesley.

MLA 

Software security : building security in. Upper Saddle River, NJ : Addison-Wesley, 2006.

Harvard 

2006. Software security : building security in. Addison-Wesley,

Chicago 

Software security : building security in. Addison-Wesley, 2006.

ßÊÇÈ/ ãÑÌÚ

CEH : certified ethical hacker study guide

APA 

(2010). CEH : certified ethical hacker study guide, Indianapolis, Ind.: Wiley Publishing, Inc..

MLA 

CEH : certified ethical hacker study guide. Indianapolis, Ind.: Wiley Publishing, Inc., 2010.

Harvard 

2010. CEH : certified ethical hacker study guide. Wiley Publishing, Inc.,

Chicago 

CEH : certified ethical hacker study guide. Wiley Publishing, Inc., 2010.

ßÊÇÈ/ ãÑÌÚ

Gray hat hacking : the ethical hacker’s handbook

APA 

(2011). Gray hat hacking : the ethical hacker’s handbook, New York: McGraw-Hill.

MLA 

Gray hat hacking : the ethical hacker’s handbook. New York: McGraw-Hill, 2011.

Harvard 

2011. Gray hat hacking : the ethical hacker’s handbook. McGraw-Hill,

Chicago 

Gray hat hacking : the ethical hacker’s handbook. McGraw-Hill, 2011.

ßÊÇÈ/ ãÑÌÚ

Computer security: principles and practice

APA 

(2008). Computer security: principles and practice , Upper Saddle River, NJ.: Pearson/Prentice Hall.

MLA 

Computer security: principles and practice . Upper Saddle River, NJ.: Pearson/Prentice Hall, 2008.

Harvard 

2008. Computer security: principles and practice . Pearson/Prentice Hall,

Chicago 

Computer security: principles and practice . Pearson/Prentice Hall, 2008.

ßÊÇÈ/ ãÑÌÚ

Best antivirus collection [electronic resource]

APA 

([-2000]). Best antivirus collection [electronic resource], [s.l]: [s.n].

MLA 

Best antivirus collection [electronic resource]. [s.l]: [s.n], [-2000].

Harvard 

[-2000]. Best antivirus collection [electronic resource]. [s.n],

Chicago 

Best antivirus collection [electronic resource]. [s.n], [-2000].

ßÊÇÈ/ ãÑÌÚ

Information security and cyber laws

APA 

(2010). Information security and cyber laws, New Delhi: S. K. Kataria & Sons.

MLA 

Information security and cyber laws. New Delhi: S. K. Kataria & Sons, 2010.

Harvard 

2010. Information security and cyber laws. S. K. Kataria & Sons,

Chicago 

Information security and cyber laws. S. K. Kataria & Sons, 2010.

ßÊÇÈ/ ãÑÌÚ

Information security and cyber laws

APA 

(2011). Information security and cyber laws, New Delhi: S. K. Kataria & Sons.

MLA 

Information security and cyber laws. New Delhi: S. K. Kataria & Sons, 2011.

Harvard 

2011. Information security and cyber laws. S. K. Kataria & Sons,

Chicago 

Information security and cyber laws. S. K. Kataria & Sons, 2011.

ßÊÇÈ/ ãÑÌÚ

The art of enterprise information architecture: a systems-based approach for unlocking business insight

APA 

(2010). The art of enterprise information architecture: a systems-based approach for unlocking business insight, Upper Saddle River, NJ: IBM Press, Pearson.

MLA 

The art of enterprise information architecture: a systems-based approach for unlocking business insight. Upper Saddle River, NJ: IBM Press, Pearson, 2010.

Harvard 

2010. The art of enterprise information architecture: a systems-based approach for unlocking business insight. IBM Press, Pearson,

Chicago 

The art of enterprise information architecture: a systems-based approach for unlocking business insight. IBM Press, Pearson, 2010.

ßÊÇÈ/ ãÑÌÚ

Information security: principles and practice

APA 

(2011). Information security: principles and practice, Hoboken, New Jersey: Wiley .

MLA 

Information security: principles and practice. Hoboken, New Jersey: Wiley , 2011.

Harvard 

2011. Information security: principles and practice. Wiley ,

Chicago 

Information security: principles and practice. Wiley , 2011.

ßÊÇÈ/ ãÑÌÚ

Business data networks and security

APA 

(2013). Business data networks and security, Boston: Pearson .

MLA 

Business data networks and security. Boston: Pearson , 2013.

Harvard 

2013. Business data networks and security. Pearson ,

Chicago 

Business data networks and security. Pearson , 2013.

ßÊÇÈ/ ãÑÌÚ

Principles of information security

APA 

(2013). Principles of information security, Delhi: Cengage Learning India.

MLA 

Principles of information security. Delhi: Cengage Learning India, 2013.

Harvard 

2013. Principles of information security. Cengage Learning India,

Chicago 

Principles of information security. Cengage Learning India, 2013.

ßÊÇÈ/ ãÑÌÚ

Security and computer: management strategy

APA 

(1987). Security and computer: management strategy , Beirut: Union of Arab Banks.

MLA 

Security and computer: management strategy . Beirut: Union of Arab Banks, 1987.

Harvard 

1987. Security and computer: management strategy . Union of Arab Banks,

Chicago 

Security and computer: management strategy . Union of Arab Banks, 1987.

ßÊÇÈ/ ãÑÌÚ

Network security

APA 

(2012). Network security, New Delhi: S. K. Kataria & Sons.

MLA 

Network security. New Delhi: S. K. Kataria & Sons, 2012.

Harvard 

2012. Network security. S. K. Kataria & Sons,

Chicago 

Network security. S. K. Kataria & Sons, 2012.

ßÊÇÈ/ ãÑÌÚ

Network security : private communication in a public world

APA 

(2013). Network security : private communication in a public world, New Delhi: PHI Learning Private Limited.

MLA 

Network security : private communication in a public world. New Delhi: PHI Learning Private Limited, 2013.

Harvard 

2013. Network security : private communication in a public world. PHI Learning Private Limited,

Chicago 

Network security : private communication in a public world. PHI Learning Private Limited, 2013.

ßÊÇÈ/ ãÑÌÚ

Core banking solution : evaluation of security and controls

APA 

(2013). Core banking solution : evaluation of security and controls, New Delhi: PHI Learning Private Limited.

MLA 

Core banking solution : evaluation of security and controls. New Delhi: PHI Learning Private Limited, 2013.

Harvard 

2013. Core banking solution : evaluation of security and controls. PHI Learning Private Limited,

Chicago 

Core banking solution : evaluation of security and controls. PHI Learning Private Limited, 2013.

ßÊÇÈ/ ãÑÌÚ

Information security and cyber laws

APA 

(2014). Information security and cyber laws, New Delhi: Technical Publications.

MLA 

Information security and cyber laws. New Delhi: Technical Publications, 2014.

Harvard 

2014. Information security and cyber laws. Technical Publications,

Chicago 

Information security and cyber laws. Technical Publications, 2014.

ßÊÇÈ/ ãÑÌÚ

Computer and information security handbook

APA 

(2013). Computer and information security handbook, Amsterdam: Elsevier.

MLA 

Computer and information security handbook. Amsterdam: Elsevier, 2013.

Harvard 

2013. Computer and information security handbook. Elsevier,

Chicago 

Computer and information security handbook. Elsevier, 2013.

ßÊÇÈ/ ãÑÌÚ

Introduction to computer security

APA 

(2014). Introduction to computer security, Harlow: Pearson Education Limited.

MLA 

Introduction to computer security. Harlow: Pearson Education Limited, 2014.

Harvard 

2014. Introduction to computer security. Pearson Education Limited,

Chicago 

Introduction to computer security. Pearson Education Limited, 2014.

ßÊÇÈ/ ãÑÌÚ

Network security essentials : applications and standards

APA 

(2014). Network security essentials : applications and standards, Harlow: Pearson Education Limited.

MLA 

Network security essentials : applications and standards. Harlow: Pearson Education Limited, 2014.

Harvard 

2014. Network security essentials : applications and standards. Pearson Education Limited,

Chicago 

Network security essentials : applications and standards. Pearson Education Limited, 2014.

ßÊÇÈ/ ãÑÌÚ

Computer forensics : infoSec Pro guide

APA 

(2013). Computer forensics : infoSec Pro guide, New York: McGraw-Hill.

MLA 

Computer forensics : infoSec Pro guide. New York: McGraw-Hill, 2013.

Harvard 

2013. Computer forensics : infoSec Pro guide. McGraw-Hill,

Chicago 

Computer forensics : infoSec Pro guide. McGraw-Hill, 2013.

ßÊÇÈ/ ãÑÌÚ

Security + guide to network security fundamentals

APA 

(2012). Security + guide to network security fundamentals, Australia: Course Technology.

MLA 

Security + guide to network security fundamentals. Australia: Course Technology, 2012.

Harvard 

2012. Security + guide to network security fundamentals. Course Technology,

Chicago 

Security + guide to network security fundamentals. Course Technology, 2012.

ßÊÇÈ/ ãÑÌÚ

Handbook of research on emerging developments in data privacy

APA 

(2015). Handbook of research on emerging developments in data privacy, USA: IGI Global.

MLA 

Handbook of research on emerging developments in data privacy. USA: IGI Global, 2015.

Harvard 

2015. Handbook of research on emerging developments in data privacy. IGI Global,

Chicago 

Handbook of research on emerging developments in data privacy. IGI Global, 2015.

ßÊÇÈ/ ãÑÌÚ

Securing the virtual environment : how to defend the enterprise against attack

APA 

(2012). Securing the virtual environment : how to defend the enterprise against attack, New Delhi: Wiley India Pvt. Ltd.

MLA 

Securing the virtual environment : how to defend the enterprise against attack. New Delhi: Wiley India Pvt. Ltd, 2012.

Harvard 

2012. Securing the virtual environment : how to defend the enterprise against attack . Wiley India Pvt. Ltd,

Chicago 

Securing the virtual environment : how to defend the enterprise against attack . Wiley India Pvt. Ltd, 2012.

ßÊÇÈ/ ãÑÌÚ

CompTIA security + (Exam SYO-301) : training kit

APA 

(2014). CompTIA security + (Exam SYO-301) : training kit, New Delhi: PHI Learning Private Limited.

MLA 

CompTIA security + (Exam SYO-301) : training kit. New Delhi: PHI Learning Private Limited, 2014.

Harvard 

2014. CompTIA security + (Exam SYO-301) : training kit. PHI Learning Private Limited,

Chicago 

CompTIA security + (Exam SYO-301) : training kit. PHI Learning Private Limited, 2014.

ßÊÇÈ/ ãÑÌÚ

Network security

APA 

(2013). Network security, New Delhi: S. K. Kataria & Sons.

MLA 

Network security. New Delhi: S. K. Kataria & Sons, 2013.

Harvard 

2013. Network security. S. K. Kataria & Sons,

Chicago 

Network security. S. K. Kataria & Sons, 2013.

ßÊÇÈ/ ãÑÌÚ

Information security management handbook

APA 

(2012). Information security management handbook, London: CRC Press/ Taylor & Francis.

MLA 

Information security management handbook. London: CRC Press/ Taylor & Francis, 2012.

Harvard 

2012. Information security management handbook. CRC Press/ Taylor & Francis,

Chicago 

Information security management handbook. CRC Press/ Taylor & Francis, 2012.

ßÊÇÈ/ ãÑÌÚ

Computer security: principles and practice

APA 

(2015). Computer security: principles and practice , Boston: Pearson Education Limited.

MLA 

Computer security: principles and practice . Boston: Pearson Education Limited, 2015.

Harvard 

2015. Computer security: principles and practice . Pearson Education Limited,

Chicago 

Computer security: principles and practice . Pearson Education Limited, 2015.

ßÊÇÈ/ ãÑÌÚ

Cryptography and network security: principles and practice

APA 

(2014). Cryptography and network security: principles and practice, Boston: Pearson Education Limited.

MLA 

Cryptography and network security: principles and practice. Boston: Pearson Education Limited, 2014.

Harvard 

2014. Cryptography and network security: principles and practice. Pearson Education Limited,

Chicago 

Cryptography and network security: principles and practice. Pearson Education Limited, 2014.

ßÊÇÈ/ ãÑÌÚ

Core software security : security at the source

APA 

(2014). Core software security : security at the source, London: CRC Press, Taylor & Francis Group .

MLA 

Core software security : security at the source. London: CRC Press, Taylor & Francis Group , 2014.

Harvard 

2014. Core software security : security at the source. CRC Press, Taylor & Francis Group ,

Chicago 

Core software security : security at the source. CRC Press, Taylor & Francis Group , 2014.

ßÊÇÈ/ ãÑÌÚ

Secure and resilient software development

APA 

(2010). Secure and resilient software development, London: CRC Press/Taylor & Francis Group.

MLA 

Secure and resilient software development. London: CRC Press/Taylor & Francis Group, 2010.

Harvard 

2010. Secure and resilient software development. CRC Press/Taylor & Francis Group,

Chicago 

Secure and resilient software development. CRC Press/Taylor & Francis Group, 2010.

ßÊÇÈ/ ãÑÌÚ

Secure software design

APA 

(2013). Secure software design, Burlington: Johnes & Bartlett Learning.

MLA 

Secure software design. Burlington: Johnes & Bartlett Learning, 2013.

Harvard 

2013. Secure software design. Johnes & Bartlett Learning,

Chicago 

Secure software design. Johnes & Bartlett Learning, 2013.

ßÊÇÈ/ ãÑÌÚ

Principles of information security

APA 

(2016). Principles of information security, Boston: Cengage Learning.

MLA 

Principles of information security. Boston: Cengage Learning, 2016.

Harvard 

2016. Principles of information security. Cengage Learning,

Chicago 

Principles of information security. Cengage Learning, 2016.

ßÊÇÈ/ ãÑÌÚ

The web application : hacker's handbook

APA 

(2011). The web application : hacker's handbook, Indianapolis: Wiley Publishing , Inc..

MLA 

The web application : hacker's handbook. Indianapolis: Wiley Publishing , Inc., 2011.

Harvard 

2011. The web application : hacker's handbook. Wiley Publishing , Inc.,

Chicago 

The web application : hacker's handbook. Wiley Publishing , Inc., 2011.

ßÊÇÈ/ ãÑÌÚ

Computer security fundamentals

APA 

(2016). Computer security fundamentals, Indianapolis: Pearson Education.

MLA 

Computer security fundamentals. Indianapolis: Pearson Education, 2016.

Harvard 

2016. Computer security fundamentals. Pearson Education,

Chicago 

Computer security fundamentals. Pearson Education, 2016.

ßÊÇÈ/ ãÑÌÚ

Security + guide to network security fundamentals

APA 

(2018). Security + guide to network security fundamentals, Australia: Cengage Learning.

MLA 

Security + guide to network security fundamentals. Australia: Cengage Learning, 2018.

Harvard 

2018. Security + guide to network security fundamentals. Cengage Learning,

Chicago 

Security + guide to network security fundamentals. Cengage Learning, 2018.

ßÊÇÈ/ ãÑÌÚ

Foundations of information security : a straightforward introduction

APA 

(2019). Foundations of information security : a straightforward introduction, San Francisco: No Starch Press.

MLA 

Foundations of information security : a straightforward introduction. San Francisco: No Starch Press, 2019.

Harvard 

2019. Foundations of information security : a straightforward introduction. No Starch Press,

Chicago 

Foundations of information security : a straightforward introduction. No Starch Press, 2019.

ßÊÇÈ/ ãÑÌÚ

Security of web developers

APA 

(2016). Security of web developers, Beijing: O'Reilly Media.

MLA 

Security of web developers. Beijing: O'Reilly Media, 2016.

Harvard 

2016. Security of web developers. O'Reilly Media,

Chicago 

Security of web developers. O'Reilly Media, 2016.

ßÊÇÈ/ ãÑÌÚ

Security + guide to network security fundamentals

APA 

(2012). Security + guide to network security fundamentals, Australia: Course Technology.

MLA 

Security + guide to network security fundamentals. Australia: Course Technology, 2012.

Harvard 

2012. Security + guide to network security fundamentals. Course Technology,

Chicago 

Security + guide to network security fundamentals. Course Technology, 2012.

ßÊÇÈ/ ãÑÌÚ

Fintech law in a nutshell

APA 

(2020). Fintech law in a nutshell, Paul, MN.: West Academic Publishing.

MLA 

Fintech law in a nutshell. Paul, MN.: West Academic Publishing, 2020.

Harvard 

2020. Fintech law in a nutshell. West Academic Publishing,

Chicago 

Fintech law in a nutshell. West Academic Publishing, 2020.

ßÊÇÈ/ ãÑÌÚ

Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework

APA 

(2022). Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework, Hoboken: John Wiley & Sons.

MLA 

Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework. Hoboken: John Wiley & Sons, 2022.

Harvard 

2022. Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework. John Wiley & Sons,

Chicago 

Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework. John Wiley & Sons, 2022.

ßÊÇÈ/ ãÑÌÚ

Information security: principles and practice

APA 

(2022). Information security: principles and practice, Hoboken, New Jersey: Wiley .

MLA 

Information security: principles and practice. Hoboken, New Jersey: Wiley , 2022.

Harvard 

2022. Information security: principles and practice. Wiley ,

Chicago 

Information security: principles and practice. Wiley , 2022.

ßÊÇÈ/ ãÑÌÚ

Cryptography and network security: principles and practice

APA 

(2023). Cryptography and network security: principles and practice, Boston: Pearson Education Limited.

MLA 

Cryptography and network security: principles and practice. Boston: Pearson Education Limited, 2023.

Harvard 

2023. Cryptography and network security: principles and practice. Pearson Education Limited,

Chicago 

Cryptography and network security: principles and practice. Pearson Education Limited, 2023.

ßÊÇÈ/ ãÑÌÚ

Fintech : hacking, blockchain, big data, cryptocurrency (financial technology, smart contracts, digital banking, Internet technology)

APA 

(2017). Fintech : hacking, blockchain, big data, cryptocurrency (financial technology, smart contracts, digital banking, Internet technology) , UK: EPR Bublishing.

MLA 

Fintech : hacking, blockchain, big data, cryptocurrency (financial technology, smart contracts, digital banking, Internet technology) . UK: EPR Bublishing, 2017.

Harvard 

2017. Fintech : hacking, blockchain, big data, cryptocurrency (financial technology, smart contracts, digital banking, Internet technology) . EPR Bublishing,

Chicago 

Fintech : hacking, blockchain, big data, cryptocurrency (financial technology, smart contracts, digital banking, Internet technology) . EPR Bublishing, 2017.

ßÊÇÈ/ ãÑÌÚ

Fundamentals of information systems security

APA 

(2023). Fundamentals of information systems security, Burlington: Jones & Bartlett Learning.

MLA 

Fundamentals of information systems security. Burlington: Jones & Bartlett Learning, 2023.

Harvard 

2023. Fundamentals of information systems security. Jones & Bartlett Learning,

Chicago 

Fundamentals of information systems security. Jones & Bartlett Learning, 2023.