Your search returned 65 results.

Sort
Results
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh [et.al] by Publisher: Indianapolis, IN : Wiley, c2014
Other title:
  • Detecting malware and threats in Windows, Linux, and Mac memory
Online access:
Availability: Items available for loan: Engineering Library (1)Call number: 004.50285/58 ART 1.

Protocols for authentication and key establishment / Colin Boyd, Anish Mathuria. by Series: Information security and cryptography
Publication details: Berlin ; New York : Springer, c2003
Availability: Items available for loan: Engineering Library (1)Call number: 005.82 BOY 1.

Electronic commerce: A managerial perspective / Turban, Efraim ...et al. by
Publication details: New Jersey : Printice Hall, c 2000
Availability: Items available for loan: Engineering Library (1)Call number: 658.05 ELE 1.

Contemporary data communications : a practical approach / Emilio Ramos, Al Schroeder. by
Publication details: New York : Toronto : New York : Macmillan Pub. Co. ; Maxwell Macmillan Canada ; Maxwell Macmillan International, c1994
Availability: Items available for loan: Engineering Library (1)Call number: 004.616 RAM 1.

Building an intranet / Tim Evans. by
Edition: 1st edition.
Publication details: Indianapolis, Ind. : Sams.net, c1996
Availability: Items available for loan: Engineering Library (1)Call number: 004.68 EVA 1.

Pages