Khulna University of Engineering & Technology
Central Library

Your search returned 56 results. Subscribe to this search

|
1. Computer communications security : principles, standard protocols, and techniques / Warwick Ford.

by Ford, Warwick.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Englewood Cliffs, N.J. : PTR Prentice Hall, c1994Availability: Items available for loan: [Call number: 005.8 FOR] (15).
2. Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner.

by Kaufman, Charlie | Perlman, Radia | Speciner, Michael.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Prentice Hall PTR, c2002.[Reprinted 2005]Availability: Items available for loan: [Call number: 005.8 KAU] (4). Checked out (1).
3. Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P | Pfleeger, Shari Lawrence.

Edition: 3rd ed.Material type: book Book; Format: print Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c2003.[Reprinted 2003 , 2005]Availability: Items available for loan: [Call number: 005.8 PFL] (15). Checked out (5).
4. Computer security / Dieter Gollmann.

by Gollmann, Dieter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester ; New York : Wiley, c1999Online access: Publisher description | Table of Contents only | Contributor biographical information Availability: Items available for loan: [Call number: 005.8 GOL] (6).
5. Information security risk analysis / Thomas R. Peltier.

by Peltier, Thomas R.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Fiction Publisher: Boca Raton : Auerbach Publications, c2005Online access: Publisher description Availability: Items available for loan: [Call number: 005.8 PEL] (2).
6. Security engineering : a guide to building dependable distributed systems / Ross J. Anderson.

by Anderson, Ross.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley Pub., c2008.[Repeinted]Availability: Items available for loan: [Call number: 005.1 AND] (2).
7. Fundamentals of computer security technology / Edward G. Amoroso.

by Amoroso, Edward G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Englewood Cliffs, N.J. : PTR Prentice Hall, c1994Availability: Items available for loan: [Call number: 005.8 AMO] (14).
8. Microsoft encyclopedia of security / Mitch Tulloch.

by Tulloch, Mitch.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Redmond, Wash. : New Delhi : Microsoft Press ; Prentice-Hall, c2003 [reprinted 2004]Online access: Contributor biographical information | Publisher description Availability: Items available for loan: [Call number: 005.803 TUL] (1).
9. Fundamentals of computer security technology / Edward G. Amoroso.

by Amoroso, Edward G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Englewood Cliffs, N.J. : PTR Prentice Hall, c1994Availability: Items available for loan: [Call number: 005.8 AMO] (1).
10. Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner.

by Kaufman, Charlie | Perlman, Radia | Speciner, Michael.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Englewood Cliffs, New Jersey : New Delhi : PTR Prentice Hall ; Prentice Hall of India, c2002.[Reprinted 2003]Availability: Items available for loan: [Call number: 005.8 KAU] (2).
11. Network security essentials : applications and standards / William Stallings.

by Stallings, William.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Pearson Education, c2007Online access: Table of contents only Availability: Items available for loan: [Call number: 005.8 STA] (2).
12. Modern cryptography, probabilistic proofs, and pseudorandomness / Oded Goldreich.

by Goldreich, Oded.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin ; New York : Springer, c1999Online access: Publisher description | Table of contents only Availability: Items available for loan: [Call number: 005.8 GOL] (2).
13. Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.

by Schneier, Bruce, 1963-.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : John Wiley and Sons, Inc., c1996Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: [Call number: 005.82 SCH] (7). Checked out (1).
14. Red Hat Linux security and optimization / Mohammed J. Kabir.

by Kabir, Mohammed J, 1971-.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York ; New Delhi : Hungry Minds, c2002 [reprinted 2002]Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: [Call number: 005.8 KAB] (1).
15. Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah.

by McClure, Stuart | Shah, Saumil | Shah, Shreeraj.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston : Addison-Wesley, c2003Availability: Items available for loan: [Call number: 005.8 MCC] (1).
16. Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah.

by McClure, Stuart | Shah, Saumil | Shah, Shreeraj.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston : Addison-Wesley, c2003Availability: Items available for loan: [Call number: 005.8 MCC] (1).
17. The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / Dr. Patrick Engebretson, David Kennedy, Technical Editor.

by Engebretson, Pat (Patrick Henry), 1974-.

Edition: Second Edition.Material type: book Book; Format: print ; Literary form: Not fiction Availability: Items available for reference: [Call number: 005.8 ENG] (1).
18. Network security essentials : applications and standards / William Stallings.

by Stallings, William.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi : Pearson Education, c2011[reprinted 2013]Availability: Items available for loan: [Call number: 005.8 STA] (1). Items available for reference: [Call number: 005.8 STA] (1).
19. Introduction to computer security / Matt Bisop, Sathyanarayana S Venkatramanayya

by Bishop, Matt | Venkatramanayya, Sathyanarayana S [Author].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi : Pearson Education, c2006 [reprinted 2013]Availability: Items available for loan: [Call number: 005.8 BIS] (1). Items available for reference: [Call number: 005.8 BIS] (1).
20. Fundamentals network security / Eric Maiwld

by Maiwald, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi : McGraw Hill, c2004.[Reprinted 2010, 2013]Availability: Items available for loan: [Call number: 005.8 MAI] (1). Items available for reference: [Call number: 005.8 MAI] (1).
21. Computer security / Alfred Basta and Wolfa Halton

by Basta, Alfred.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi : Course Technology, c2007Online access: Publisher description | Table of Contents only | Contributor biographical information Availability: Items available for loan: [Call number: 005.8 BAS] (2). Items available for reference: [Call number: 005.8 BAS] (1).
22. Information security : principles and practice / Mark Stamp.

by Stamp, Mark.

Edition: 2nd ed.Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, N.J. : Wiley, ©2011Online access: Wiley Online Library Availability: No items available
23. Healthcare fraud : auditing and detection guide / Rebecca Saltiel Busch.

by Busch, Rebecca S.

Edition: 2nd ed.Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, N.J. : John Wiley & Sons, ©2012Online access: Wiley Online Library Availability: No items available
24. Auditor's guide to IT auditing / Richard E. Cascarino.

by Cascarino, Richard | Cascarino, Richard. Auditor's guide to information systems auditing.

Edition: 2nd ed.Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, N.J. : Wiley, ©2012Online access: Wiley Online Library Availability: No items available
25. Cyber security policy guidebook / Jennifer L. Bayuk [and others].

by Bayuk, Jennifer L.

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, N.J. : Wiley, ©2012Online access: Wiley Online Library Availability: No items available
26. Reliability and availability of cloud computing / Eric Bauer, Randee Adams.

by Bauer, Eric | Adams, Randee | Wiley InterScience (Online service).

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, N.J. : Wiley-IEEE Press, 2012Online access: Wiley Online Library Availability: No items available
27. Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and business / Erik Laykin, CHFI, CEDS.

by Laykin, Erik.

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken : John Wiley, 2013Online access: Wiley Online Library Availability: No items available
28. Computer security handbook / edited by Seymour Bosworth, Michel E. Kabay, Eric Whyne.

by Bosworth, Seymour [editor.] | Kabay, Michel E [editor.] | Whyne, Eric, 1981- [editor.].

Edition: Sixth edition.Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, New Jersey : Wiley, [2014]Online access: Wiley Online Library Availability: No items available
29. Cloud management and security / Imad M. Abbadi.

by Abbadi, Imad M [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Chichester, West Sussex ; Hoboken, NJ : John Wiley & Sons Inc., 2014Online access: Wiley Online Library Availability: No items available
30. Understanding Bitcoin : Cryptography, Engineering and Economics / Pedro Franco.

by Franco, Pedro [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Chichester, West Sussex : Wiley, 2015Online access: Wiley Online Library Availability: No items available
31. Phishing dark waters : the offensive and defensive sides of malicious emails / Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke.

by Hadnagy, Christopher [author.] | Fincher, Michele [author.] | Dreeke, Robin [writer of supplementary textual content.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, [2015]Copyright date: ©2015Online access: Wiley Online Library Availability: No items available
32. Security intelligence : a practitioner's guide to solving enterprise security challenges / Qing Li, Gregory Clark.

by Li, Qing, 1971- [author.] | Clark, Gregory [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, 2015Online access: Wiley Online Library Availability: No items available
33. Beyond cybersecurity : protecting your digital business / James M. Kaplan, Tucker Bailey, Chris Rezek, Derek O'Halloran, Alan Marcus.

by Kaplan, James M [author.] | Bailey, Tucker [author.] | Rezek, Chris [author.] | O'Halloran, Derek [author.] | Marcus, Alan [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Hoboken, New Jersey : Wiley, 2015Online access: Wiley Online Library Availability: No items available
34. Network attacks and exploitation : a framework / Matthew Monte.

by Monte, Matthew [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, 2015Copyright date: ©2015Other title: Network attacks & exploitation.Online access: Wiley Online Library Availability: No items available
35. The network security test lab : a step-by-step guide / Michael Gregg.

by Gregg, Michael (Michael C.) [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, [2015]Copyright date: ©2015Online access: Wiley Online Library Availability: No items available
36. The antivirus hacker's handbook / Joxean Koret, Elias Bachaalany.

by Koret, Joxean [author.] | Bachaalany, Elias [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : John Wiley & Sons, Inc., [2015]Copyright date: ©2015Online access: Wiley Online Library Availability: No items available
37. Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs.

by Jacobs, Stuart [author.].

Edition: Second edition.Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Piscataway, NJ : Hoboken, N.J. : IEEE Press ; Wiley, [2016]Copyright date: ©2016Online access: Wiley Online Library Availability: No items available
38. Unauthorized access [electronic resource] : the crisis in online privacy and security / Robert H. Sloan and Richard Warner.

by Sloan, Robert H | Warner, Richard, 1946-.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2014Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
39. Network anomaly detection : a machine learning perspective / Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita.

by Bhattacharyya, Dhruba K [author.] | Kalita, Jugal Kumar [author].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, [2014]Copyright date: �201Online access: Distributed by publisher. Purchase or institutional license may be required for access Availability: No items available
40. Cryptanalysis of RSA and its variants [electronic resource] / M. Jason Hinek.

by Hinek, M. Jason.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, c2010Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
41. Discrete dynamical systems and chaotic machines [electronic resource] : theory and applications / Jacques M. Bahi, Christophe Guyeux.

by Bahi, Jacques Mohcine | Guyeux, Christophe.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2013Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
42. Investigator's guide to steganography [electronic resource] / Gregory Kipper.

by Kipper, Gregory.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boca Raton, FL : Auerbach Publications, c2004Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
43. Machine learning forensics for law enforcement, security, and intelligence [electronic resource] / Jesus Mena.

by Mena, Jesus.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boca Raton, Fla. : Taylor & Francis, 2011Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
44. Honeypot [electronic resource] : a new paradigm to information security / R.C. Joshi, Anjali Sardana.

by Joshi, R. C | Sardana, Anjali.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Enfield, N.H. : Science Publishers, 2011Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
45. Enhancing computer security with smart technology [electronic resource] / editor, V. Rao Vemuri.

by Vemuri, V. Rao.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boca Raton, FL : Auerbach Publications, 2006Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
46. Digital forensics for handheld devices [electronic resource] / Eamon P. Doherty.

by Doherty, Eamon P.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boca Raton, Fla. : CRC Press, 2013Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
47. Security and policy driven computing [electronic resource] / Lei Liu.

by Liu, Lei, 1968-.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boca Raton, Fla. : CRC Press, c2011Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
48. Software test attacks to break mobile and embedded devices / Jon Duncan Hagar.

by Hagar, Jon Duncan [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, [2014]Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
49. Data mining and machine learning in cybersecurity [electronic resource] / Sumeet Dua and Xian Du.

by Dua, Sumeet | Du, Xian.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boca Raton : Taylor & Francis, 2011Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
50. RC4 stream cipher and its variants [electronic resource] / Goutam Paul, Subhamoy Maitra.

by Paul, Goutam | Maitra, Subhamoy, 1970-.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boca Raton, Fla. : CRC Press, c2012Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available


Khulna University of Engineering & Technology
Funded by: HEQEP, UGC, Bangladesh