Skip to main content
Anna Centenary Library
Lists
Public lists
கணினி1
View all
Your cookies
Search history
Search the Library Catalogue
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Accession No.
Go
Advanced search
Search
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
Library
Log in to your account
Card number or username:
Password:
Home
Advanced search
Results of search for 'su:"Computers Security General"'
Refine your search
Availability
Limit to records with available items
Authors
Butow, Michael
Dulaney, Emmett
Girod, Robert J
Gupta, Rashmi
Haber, Morey J
Hibbert, Brad
Krutz, Ronald L
Mamju, khari
Nelson
Ostrovskaya, Svetlan...
Pastore, Mike
Phillips, Steuart ;C...
Ransome, James
Sabih, Zaid
Solari, Carlos Curti...
Vines, Russell Dean
Wali, Mohamed
Wu, Chwan-Hwa
Show more
Show less
Item types
Books
English Books
Reference
Locations
3RD FLOOR, A WING
Topics
Biometric identific...
Cloud computing; Co...
COMPUTERS / Securit...
Computers Internet ...
COMPUTERS Internet ...
COMPUTERS Programmi...
Computer networks
Computer networks - ...
Computer networks - ...
Computer Science Ap...
Computer Security
Computer security - ...
COMPUTERS / Networki...
COMPUTERS / Security...
COMPUTERS Operating ...
COMPUTERS Security G...
Computers Security G...
Criminal investigati...
Forensic sciences
LAW / Criminal Law /...
Show more
Show less
Your search returned 14 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Results
1.
Image from Google Jackets
Cloud security : a comprehensive guide to secure cloud computing
Ronald L. Krutz and Russell Dean Vines
by
Krutz, Ronald L
Vines, Russell Dean
Edition:
1st ed
Publication details:
Hoboken, N.J
Wiley
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.6782 KRU
.
2.
Image from Google Jackets
CompTIA security+ deluxe study guide : exam SY0-101
Mike Pastore, Emmett Dulaney
by
Pastore, Mike
Dulaney, Emmett
Publication details:
Indianapolis, IN
Wiley Technology Pub
c2011
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PAS
.
3.
Image from Google Jackets
Introduction to computer networks and cybersecurity
Chwan-Hwa (John) Wu, Auburn University, J. David Irwin, Auburn University
by
Wu, Chwan-Hwa
Publication details:
Boca Raton, FL
CRC Press/Taylor & Francis Group
[2013]
Availability:
Items available for loan:
Anna Centenary Library
(4).
4.
Image from Google Jackets
Logical investigative methods : critical thinking and reasoning for successful investigations
by Robert J. Girod
by
Girod, Robert J
Publication details:
Baca Raton, FL
Taylor & Francis
2015
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25 GIR
.
5.
Image from Google Jackets
Multimodal biometric systems
/ Gupta
security and applications
by
Gupta, Rashmi
Mamju, khari
Edition:
1st ed.
Language:
English
Publication details:
Abingdon, Oxon :
Crc
c2022
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
006.2 RAS
.
6.
Image from Google Jackets
Learn ethical hacking from scratch your stepping stone to penetration testing
by
Sabih, Zaid
Language:
English
Publication details:
Birmingham, UK :
Packt
c2018
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 SAB;1
.
Not available:
Anna Centenary Library: Checked out
(1).
7.
Image from Google Jackets
Learn microsoft azure build, manage, and scale cloud applications using the azure ecosystem
by
Wali, Mohamed
Language:
English
Publication details:
UK :
Packt
c2018
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(2)
Call number:
005.75 WAL, ..
.
8.
Image from Google Jackets
Guide To Computer Forensics and Investigations
/ Bill Nelson, Amelia Phillips And Christopher Steuart
by
Nelson
Phillips, Steuart ;Computer security ; Criminalité informatique Enquêtes
Edition:
6th ed.
Language:
English
Publication details:
Cengage
2019
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
363.25 NEL, ..
.
9.
Image from Google Jackets
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
/Morey J. Haber, and Brad Hibbert
by
Haber, Morey J
Hibbert, Brad
Language:
English
Publication details:
: [s. l.]
Apress,
c2018
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 HAB
.
Not available:
Anna Centenary Library: Checked out
(1).
10.
Image from Google Jackets
Pro Ios Security and Forensics: Enterprise Iphone and Ipad Safety
/Butow
by
Butow, Michael
Language:
English
Publication details:
USA
Apress
2019
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
005.8 BUT, ..
.
11.
Image from Google Jackets
Building in Security At Agile Speed
/James F. Ransome, Brook S. E. Schoenfield
by
Ransome, James
Edition:
1st edition
Language:
English
Publication details:
New York.
Auerbach Publications
2021
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.1 RAN
.
12.
Image from Google Jackets
Practical Memory forensics
/ Svetlana Ostrovskaya, Oleg Skulkin
by
Ostrovskaya, Svetlana
Edition:
1st edition
Language:
English
Publication details:
Birmingham,
Packt
2022
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.365 OST
.
13.
Image from Google Jackets
Security In A Web 2.0+ World : A Standards Based Approach
/Carlos Curtis Solari
by
Solari, Carlos Curtis
Language:
English
Publication details:
United Kindom
John Wiley & Sons, Inc.,
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SOL
.
14.
Image from Google Jackets
Security In Wireless Mesh Networks :
edited by Yan Zhang, Jun Zheng, Honglin Hu
Language:
English
Publication details:
London
Crc Press
2008
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 ZHA
.
Find us on the map