Refine your search

Your search returned 29 results.

Sort
Results
1.
Essential Computers: Computer Troubleshooting/ Andrew Easton. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London: A Dorling kindersley Book, c2000
Availability: Items available for loan: Lahore Business School Library (1)Call number: 005 EAS-C 2000 804716.

2.
Preventing computer fraud / Dana L. Stern. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : McGraw-Hill, c1993
Availability: Items available for loan: Lahore Business School Library (1)Call number: 364.168 STE-P 1993 801685.

3.
Security Transformation : Digital Defense Strategies to Protect Your Company's Reputation and Market Share / Mary Pat McCarthy, Stuart Campbell ; with Rob Brownstein. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : McGraw-Hill, c2001
Availability: Items available for loan: Lahore Business School Library (4)Call number: 658.0558 MCC-S 2001 802815, ...

4.
The Disaster Recovery : A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities and Assets / Michael Wallace,Lawrence Webber. by
Material type: Computer file Computer file; Format: electronic available online remote
Publication details: New York : PHI Learning, c2004
Availability: Items available for loan: Lahore Business School Library (1)Call number: 658.477 WAL-D 2007 804753. Items available for reference: Lahore Business School Library: Not For Loan (1)Call number: 658.477 WAL-D 2007 CD804753.

5.
E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets / Michael R. Overly. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : AMACOM, c1999
Availability: Items available for loan: Lahore Business School Library (1)Call number: 658.478 OVE-E 1999 803696.

6.
Computer security : principles and practice / William Stallings, Lawrie Brown with contributions by Mick Bauer, Michael Howard. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Prentice Hall, 2008
Availability: Items available for loan: Faculty of CS & IT Library (3)Call number: 005.8 STA_C 2008 783025, ... Items available for reference: Faculty of CS & IT Library : Not For Loan (1)Call number: 005.8 STA_C 2008 783028.

7.
Introduction to Computer Security Bishop, Sathyanarayana by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Pearson 2004
Availability: Items available for loan: Faculty of CS & IT Library (15)Call number: 005.8 BIS-I 2004 783634, ... UCAS (1)Call number: 004 BIS-I 2004 783633. Not available: Faculty of CS & IT Library : In transit (1).

8.
Computer Security Fundamentals Chuck Easttom by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi Dorling Kindersley 2011
Availability: Items available for loan: The University of Lahore, Gujrat campus (1)Call number: 005.8 EAS-C 2011 902323.

9.
computer security fundamentals chuck easttom by
Edition: 2nd edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: india pearson 2015
Availability: Items available for loan: The University of Lahore, Gujrat campus (1)Call number: 005.8 EAS-C 2015 904684.

10.
computer security fundamentals chuck easttom by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: india pearson 2011
Availability: Items available for loan: The University of Lahore, Gujrat campus (1)Call number: 005.8 EAS-C 2011 904264.

11.
computer security fundamentals chuck easttom by
Edition: 2nd edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: india pearson 2015
Availability: Items available for loan: The University of Lahore, Gujrat campus (3)Call number: 005.8 EAS-C 2015 909772, ...

12.
Analyzing computer security a threat/vulnerability/countermeasure approach Charles P Pfleeger by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: India Pearson 2014
Availability: Items available for loan: UCAS (1)Call number: 005.8 PFL-A 2014 789949.

13.
Safeguarding Critical E-Documents : Implementing a Program for Securing Confidential Information Assets / Robert F. Smallwood. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Hoboken, New Jersey : John Wiley & Sons, Inc., 2012
Availability: Items available for loan: Lahore Business School Library (1)Call number: 005.8 SMA-S 2012 815722.

14.
Blockchain systems and communication networks : from concepts to implementation / Mubashir Husain Rehmani. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Springer Nature, Cham, Switzerland: 2021
Availability: Items available for loan: Faculty of CS & IT Library (1)Call number: 621.3821 REH-B 2021 789455.

15.
The CISO evolution: Business knowledge for cybersecurity executives / Matthew K. Sharp , Kyriakos P. Lambros. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Inc., Hoboken, New Jersey, John Wiley & Sons, 2022
Availability: Items available for loan: Faculty of CS & IT Library (1)Call number: 658.4038011 SHA-T 2022 789499.

16.
Next generation and advanced network reliability analysis : using Markov models and software reliability engineering / Syed Riffat Ali. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cham, Switzerland: Springer, 2019
Availability: Items available for loan: Faculty of CS & IT Library (1)Call number: 519.233 ALI-N 2019 789465.

17.
Python for Cybersecurity : using python for cyber offense and defense / Howard E Poston. by
Edition: 1.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hobken: Wiley, c2022
Availability: Not available: Faculty of CS & IT Library : In transit (1).

18.
Machine learning for computer and cyber security : principles, algorithms, and practices / editors, Brij B. Gupta, Michael Sheng. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton: CRC Press, Taylor & Francis Group, c2020
Availability: Items available for loan: Faculty of CS & IT Library (1)Call number: 006.31 GUP-M 2020 789545.

19.
Biometrics for network security / Paul Reid. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: India: Pearson, c2008
Availability: Items available for reference: Faculty of CS & IT Library : Not For Loan (1)Call number: 005.8 REI-B 2004 789572.

20.
Cryptography and network security : principles and practice / William., Stallings. by
Edition: 7th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Malaysia: Pearson, c 2020
Availability: Items available for loan: Faculty of CS & IT Library (2)Call number: 005.82 STA-C 2020 789523, ... Items available for reference: Faculty of CS & IT Library : Not For Loan (1)Call number: 005.82 STA-C 2020 789554.

Pages
Copyrights 2018© The University of Lahore (UOL) Libraries. All Rights Reserved. Library System Administrator Muhammad Riaz (muhammad.riaz@uol.edu.pk) +92 (0)42 35963421-30 Ext: 1703

Powered by Koha