Bootstrap Example

FCIT Library University of The Punjab Lahore Pakistan

Make a Dropdown Menu using Internal CSS Make a Dropdown Menu using Internal CSS Make a Dropdown Menu using Internal CSS Make a Dropdown Menu using Internal CSS Make a Dropdown Menu using Internal CSS Make a Dropdown Menu using Internal CSS Make a Dropdown Menu using Internal CSS Make a Dropdown Menu using Internal CSS Make a Dropdown Menu using Internal CSS Make a Dropdown Menu using Internal CSS Make a Dropdown Menu using Internal CSS Make a Dropdown Menu using Internal CSS Make a Dropdown Menu using Internal CSS Make a Dropdown Menu using Internal CSS

Your search returned 63 results. Subscribe to this search

|
41. Cryptography Demystified

by Hershey, John E.

Material type: book Book Publisher: New Delhi McGraw-Hill 2004Availability: Items available for loan: FCITOC [Call number: 005.8 HER] (1).

42. Hacking Exposed Network Security Secrets&Solutions

by Mcclure, Stuart | Joel Scambray.

Edition: 4thMaterial type: book Book Publisher: New Delhi McGraw-Hill 2003Availability: Items available for loan: FCITNC [Call number: 005.8 MCC] (1).

43. Introduction to Cryptography With java TM Applets

by Bishop, David.

Material type: book Book Publisher: New Delhi Narosa 2003Availability: Items available for loan: FCITOC [Call number: 005.8 BIS] (1).

44. Understanding Forensics in IT

by Niit.

Material type: book Book Publisher: New Delhi Prentice Hall 2005Availability: Items available for loan: FCITOC [Call number: 005.8 NII] (1).

45. Information Security Illuminated

by Solomon, Michael G | Mime Chapple.

Material type: book Book Publisher: USA Jonesa and Bartlett 2005Availability: Items available for loan: FCITOC [Call number: 005.8 SOL] (1).

46. Principles of Computer Security Security and Beyond

by Conklin, Arthur | Gregory B.

Material type: book Book Publisher: Singapore Mc Graw Hill 2004Availability: Items available for loan: FCITOC [Call number: 005.8 CON] (1).

47. Modern Cryptography Theory and Practice

by Mao, Wenbo.

Material type: book Book Publisher: India Pearson Education 2004Availability: Items available for loan: FCITOC [Call number: 005.8 MAO] (1).

48. Wireless Operational Security

by Rittinghouse, John W | James F. Ransome.

Material type: book Book Publisher: USA Elsevier 2004Availability: Items available for loan: FCITOC [Call number: 005.8 RIT] (1).

49. Risk Management for Computer Security Protecting Your Network and Information Assets

by Jones, Andy | Debi, Ashenden.

Material type: book Book Publisher: USA Elsevier 2005Availability: Items available for loan: FCITOC [Call number: 005.8 JON] (1).

50. ETHICS Information Technology

by Reynolds, George.

Material type: book Book Publisher: USA Thomson 2003Availability: Items available for loan: FCITOC [Call number: 005.8 REY] (1).

51. Data Communications and Network Security

by Carr,Houston H | Charles A.Snyder.

Material type: book Book Publisher: India Tata McGraw-Hill 2007Availability: Items available for loan: FCITOC [Call number: 005.8 CAR] (1).

52. Implementing Database Security and auditing A guide for DBAs, information security administrators and auditors

by Nathan,Ron Ben.

Material type: book Book Publisher: India Digital Press 2005Availability: Items available for loan: FCITOC [Call number: 005.8 NAT] (1).

53. Information Assurance for the Enterprise: A Roadmap to Information Security

by Schou,Corey | Dan Shoemaker.

Material type: book Book Publisher: India Tata McGraw-Hill 2007Availability: Items available for loan: FCITOC [Call number: 005.8 SCH] (1).

54. Internet Security A Jumpstart for Systems Administrators and IT Managers

by Speed,Tim | Juanita Ellis.

Material type: book Book Publisher: India Digital Press 2003Availability: Items available for loan: FCITOC [Call number: 005.8 SPE] (1).

55. Microsoft Encyclopedia of Security

by Tulloch,Mitch.

Material type: book Book Publisher: India Prentice-Hall 2003Availability: Items available for loan: FCITOC [Call number: 005.8 TUL] (1).

56. Privacy Protection for E-Services

by Yee,George.

Material type: book Book Publisher: USA Idea Group Publishing 2006Availability: Items available for loan: FCITNC [Call number: 005.8 YEE] (1).

57. Securing Converged IP Networks

by Macaulay, Tyson.

Material type: book Book Publisher: USA Auerbach, Publications 2006Availability: Items available for loan: FCITOC [Call number: 005.8 MAC] (1).

58. CryptoGraphics Exploiting Graphics Cards for Security

by Cook, Debra L | Angelos C. Keromyties.

Material type: book Book Publisher: USA Springer 2006Availability: Items available for loan: FCITOC [Call number: 005.8 COO] (1).

59. Security Analysis And Portfolio Management

by Fischer, Donald E | Ronald J Jordan.

Edition: 6thMaterial type: book Book Publisher: India Prentice-Hall 1995Availability: Items available for loan: FCITOC [Call number: 005.8 FIS] (1).

60. Insider Computer Fraud AN IN-DEPTH FRAMEWORK FOR DETECTING AND DEFEDING AGAINST INSIDER IT ATTACKS

by Brancik, Kenneth C.

Material type: book Book Publisher: USA Taylor and Francis Group 2008Availability: Items available for loan: FCITOC [Call number: 005.8 BRA] (1).

Designed, Developed & Maintained by: Muhammad Akram Rana, Email:library.oc@pucit.edu.pk (Copyright©PUFCIT 2022)

Powered by Koha