Your search returned 12 results. Subscribe to this search

|
1. Biometrics for Network Security

by Reid, Paul.

Edition: 1st ed.Publisher: Delhi Pearson Education 2004Availability: Items available for loan: Central Library, BUET [004.678/REI/2004] (1).

2. Cryptography and network security: principles and practice

by Stallings, William.

Edition: 3rd ed.Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: Central Library, BUET [005.8/STA/2003] (2).

3. Crytography and network security principles and practice

by Stallings, William.

Edition: 3rd ed.Publisher: New Delhi Prentice-Hall of India 2003Availability: Items available for loan: Central Library, BUET [004.678/STA/2003] (1).

4. Cryptography and network security: principles and practice

by Stallings, William.

Edition: 3rd ed.Publisher: New Delhi: Prentice-Hall of India, 2003Availability: Items available for loan: Central Library, BUET [004.678/STA/2003] (1).

5. Network security architectures

by Convery, Sean.

Edition: Ist ed.Publisher: Indianapolis, IN : Cisco Press, 2004Availability: Items available for loan: Central Library, BUET [004.678/CON/2004] (1).

6. Cisco networking academy program fundamentals of network security companion guide

by -- Cisco Systems, Inc

Publisher: Delhi: Pearson Education, 2004Availability: Items available for loan: Central Library, BUET [004.678/CIS/2004] (1).

7. CCSP self-study : Cisco secure intrusion detection system (CSIDS)

by Carter, Earl.

Edition: 2nd ed.Publisher: Delhi: Pearson Education, 2004Availability: Items available for loan: Central Library, BUET [004.678/CAR/2004] (1).

8. Network security: the complete reference

by Bragg, Roberta; Phodes-Ousley, Mark; Strassberg, Keith.

Edition: 1st ed.Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: Central Library, BUET [004.678/BRA/2004] (2).

9. Network security private communication in a public world

by Kaufman, Charlie; Perlman, Radia; Speciner, Michael.

Edition: 1st ed.Publisher: New Delhi Prentice-Hall of India 2002Availability: Items available for loan: Central Library, BUET [004.678/KAU/2002] (1).

10. Technologies for smart nation

by -- 10th Proceedings of the 2016 IEEE region conference (TENCON) Singapore 11/22/2016; .

Publisher: Singapore IEEE 2016Availability: Items available for loan: Central Library, BUET [623.82/PRO/2016] (1).

11. Conditional variational laplace autoencoder based network intrusion detection system

by Shuhana Azmin.

Publisher: Dhaka Department of Computer Science and Engineering, BUET 2022Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [004.678/SHU/2022] (1).

12. Analysis of violence detection algorithms using video adversarial attacks

by Bayazid Rahman, Md.

Publisher: Dhaka Institute of Information and Communication Technology, BUET 2023Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [004.678/BAY/2023] (1).