Results
|
|
221.
|
The official (ISC)2 CISSP CBK reference by Deane, Arthur J [Author] | Kraus, Aaron [Co-Author]. Edition: 6th ed.Material type: Text; Literary form: Language: English Publication details: New Jersey: Wiley Data and Cybersecurity, 2021Online access: Click here to access online Availability: Items available for loan: Dr. S. R. Ranganathan Library (1)Location, call number: Ebook (Online Access) 016.391.
|
|
|
222.
|
The official (ISC)2 SSCP CBK reference by Wills, Mike [Author]. Edition: 5th ed.Material type: Text; Literary form: Language: English Publication details: New Jersey: Wiley Data and Cybersecurity, 2020Online access: Click here to access online Availability: Items available for loan: Dr. S. R. Ranganathan Library (1)Location, call number: Ebook (Online Access) 016.391.
|
|
|
223.
|
|
|
|
224.
|
|
|
|
225.
|
|
|
|
226.
|
The uncertain digital revolution by Vitalis, Andre [Author]. Material type: Text; Literary form: Language: English Publication details: New Jersey: Wiley Data and Cybersecurity, 2016Online access: Click here to access online Availability: Items available for loan: Dr. S. R. Ranganathan Library (1)Location, call number: Ebook (Online Access) 004.
|
|
|
227.
|
The wiley 5G REF: security by Tafazolli, Rahim [Author] | Wang, Chin-Liang [Co-Author] | Chatzimisios, Periklis [Co-Author] | Liyanage, Madhusanka [Editor]. Material type: Text; Literary form: Language: English Publication details: New Jersey: Wiley Data and Cybersecurity, 2021Online access: Click here to access online Availability: Items available for loan: Dr. S. R. Ranganathan Library (1)Location, call number: Ebook (Online Access) 004.8.
|
|
|
228.
|
|
|
|
229.
|
Threat modeling: designing for security by Shostack, Adam [Author]. Material type: Text; Literary form: Language: English Publication details: New Jersey: Wiley Data and Cybersecurity, 2014Online access: Click here to access online Availability: Items available for loan: Dr. S. R. Ranganathan Library (1)Location, call number: Ebook (Online Access) 005.87.
|
|
|
230.
|
|
|
|
231.
|
|
|
|
232.
|
|
|
|
233.
|
|
|
|
234.
|
|
|
|
235.
|
|
|
|
236.
|
Trust in computer systems and the cloud by Bursell, Mike [Author]. Material type: Text; Literary form: Language: English Publication details: New Jersey: Wiley Data and Cybersecurity, 2022Online access: Click here to access online Availability: Items available for loan: Dr. S. R. Ranganathan Library (1)Location, call number: Ebook (Online Access) 004.6782.
|
|
|
237.
|
Understanding Cisco networking technologies by Lammle, Todd [Author]. Material type: Text; Literary form: Language: English Publication details: New Jersey: Wiley Data and Cybersecurity, 2020Online access: Click here to access online Availability: Items available for loan: Dr. S. R. Ranganathan Library (1)Location, call number: Ebook (Online Access) 004.6.
|
|
|
238.
|
|
|
|
239.
|
|
|
|
240.
|
|