|
1.
|
Data protection: governance, risk management, and compliance
by Hill, David G.
Edition: 1st ed.Publisher: Boca Raton, FL : Taylor & Francis, 2009Online Access: Click here for full text. Availability: Items available for loan: Central Library, BUET [005.8 /HIL/2009] (2).
|
|
2.
|
Cryptography and network security: principles and practice
by Stallings, William.
Edition: 3rd ed.Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: Central Library, BUET [005.8/STA/2003] (2).
|
|
3.
|
Information security management : concepts and practice
by Raggad, Bel G.
Edition: Ist ed.Publisher: Boca Raton : CRC Press/Taylor & Francis, 2010Availability: Items available for loan: Central Library, BUET [005.8/RAG/2010] (2).
|
|
4.
|
Viruses revealed
by Harley, David;
Slade, Robert;
Gattiker, Urs E.
Edition: 1st ed.Publisher: New York McGraw-Hill 2001Online Access: Click here to access online | Click here to access online Availability: Items available for loan: Central Library, BUET [005.84/HAR/2001] (2).
|
|
5.
|
Data protection for library and information services
by Ticher, Paul.
Edition: 1st ed.Publisher: London Aslib 2001Availability: Items available for loan: Central Library, BUET [025.30285574/TIC/2001] (1).
|
|
6.
|
Design of a hummingbird crypto asic implementing bist technique
by Azizul Haque, Md.
Publisher: Dhaka Institute of Information and Communication Technology, BUET 2016Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/AZI/2016] (1).
|
|
7.
|
Design of a high speed crypto-processor ASIC for next generation IT security
by Roy, Niranjan.
Publisher: Dhaka Institute of Information and Communication Technology, BUET Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.82 /ROY/2007] (1).
|
|
8.
|
FPGA implementation of fault tollerent reversible contrast mapping technique
by Mahmudul Hasan.
Publisher: Dhaka Institute of Information and Communication Technology (IICT), BUET 2017Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/MAH/2017] (1).
|
|
9.
|
Protecting an enterprise network through the deployment of honey pot
by Hasnain Bari.
Publisher: Dhaka Institute of Information and Communication Technology, BUET 2021Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/HAS/2021] (1).
|