Your search returned 9 results. Subscribe to this search

|
1. Data protection: governance, risk management, and compliance

by Hill, David G.

Edition: 1st ed.Publisher: Boca Raton, FL : Taylor & Francis, 2009Online Access: Click here for full text. Availability: Items available for loan: Central Library, BUET [005.8 /HIL/2009] (2).

2. Cryptography and network security: principles and practice

by Stallings, William.

Edition: 3rd ed.Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: Central Library, BUET [005.8/STA/2003] (2).

3. Information security management : concepts and practice

by Raggad, Bel G.

Edition: Ist ed.Publisher: Boca Raton : CRC Press/Taylor & Francis, 2010Availability: Items available for loan: Central Library, BUET [005.8/RAG/2010] (2).

4. Viruses revealed

by Harley, David; Slade, Robert; Gattiker, Urs E.

Edition: 1st ed.Publisher: New York McGraw-Hill 2001Online Access: Click here to access online | Click here to access online Availability: Items available for loan: Central Library, BUET [005.84/HAR/2001] (2).

5. Data protection for library and information services

by Ticher, Paul.

Edition: 1st ed.Publisher: London Aslib 2001Availability: Items available for loan: Central Library, BUET [025.30285574/TIC/2001] (1).

6. Design of a hummingbird crypto asic implementing bist technique

by Azizul Haque, Md.

Publisher: Dhaka Institute of Information and Communication Technology, BUET 2016Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/AZI/2016] (1).

7. Design of a high speed crypto-processor ASIC for next generation IT security

by Roy, Niranjan.

Publisher: Dhaka Institute of Information and Communication Technology, BUET Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.82 /ROY/2007] (1).

8. FPGA implementation of fault tollerent reversible contrast mapping technique

by Mahmudul Hasan.

Publisher: Dhaka Institute of Information and Communication Technology (IICT), BUET 2017Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/MAH/2017] (1).

9. Protecting an enterprise network through the deployment of honey pot

by Hasnain Bari.

Publisher: Dhaka Institute of Information and Communication Technology, BUET 2021Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/HAS/2021] (1).