Facebook
Twitter
Youtube
Github
Forum
Select Language
Arabic
Bengali
Brazilian Portuguese
English
Espanol
German
Indonesian
Japanese
Thai
Malay
Persian
Accra Metropolitan University
e-learning Library
Home
Library Information
Member Area
Librarian
Help On Search
Librarian LOGIN
Collections
Back
Search
Search
Author(s)
SEARCHING...
Subject(s)
SEARCHING...
ISBN/ISSN
GMD
All GMD/Media
Accounting
Banking And Finance
Business Policy and Strategy
Communication
Computer Science
Corporate Governance
Cyber Security
Database Management
Economics
Energy Management
English Language
Entrepreneurship
Healthcare Management
Human Resource management
Information Technology
Introduction to Business
Law
Leadership
Makerting
Management
Mathematics
Nursing
Nutrition
Organisational Behaviour
Psychology
Public Administration
Purchasing and Supply Chain Ma
Research Method
Social Science
Statistic for Business
Strategic Management
WEB DESIGN
WEB Development
Collection Type
All Collections
Books
Conference Papers
Databases
Datasets
E-books
Journals and Magazies
Open Research Archive
Open Research Collections
Reference
Thesis and Dissertation
Location
All Locations
My Library
Advanced Search
Found
155
from your keywords:
Subject :
"Network Security"
You currently on page
2
of
6
page(s)
Query took
0.02407
second(s) to complete
First Page
Previous
1
2
3
4
5
Next
Last Page
Concepts in Electric Circuits
Author(s)
: Dr. Wasif Naeem -
Record Detail
XML Detail
Share to:
Concepts in Electric Circuits
Author(s)
: Dr. Wasif Naeem -
Record Detail
XML Detail
Share to:
DDos for Dummies: corero Network Security Edition
Author(s)
: Lawrence C. Miller -
Record Detail
XML Detail
Share to:
DDOS FOR DUMMIES CORERO NETWORK SECURITY EDITION
Author(s)
: Lawrence C. Miller -
Record Detail
XML Detail
Share to:
Mastering Python Design Patterns
Author(s)
: Sakis Kasampalis -
Record Detail
XML Detail
Share to:
Mastering Python Design Patterns
Author(s)
: Sakis Kasampalis -
Record Detail
XML Detail
Share to:
CRYPTOGRAPHY AND NETWORK SECURITY:PRINCIPLES AND PRACTICE. 4th edition
Author(s)
: William Stallings -
Record Detail
XML Detail
Share to:
CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE
Author(s)
: William Stallings -
Record Detail
XML Detail
Share to:
CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE
Author(s)
: William Stallings -
Record Detail
XML Detail
Share to:
Cisco Certified Network Associate Study Guide
Author(s)
: Cisco Systems Inc. -
Record Detail
XML Detail
Share to:
VEHICULAR AD HOC NETWORK SECURITY AND PRIVACY
Author(s)
: Xiaodong Lin and Rongxing Lu -
Record Detail
XML Detail
Share to:
HANDBOOK OF WIRELESS NETWORKS AND MOBILE COMPUTING
Author(s)
: Ivan Stojmenovic ́ -
Record Detail
XML Detail
Share to:
SECURITY AND COOPERATION IN WIRELESS NETWORKS
Author(s)
: Levente Butty ́an and Jean-Pierre Hubaux -
Record Detail
XML Detail
Share to:
Security in Mobile and Wireless Networks
Author(s)
: Ray Hunt -
Record Detail
XML Detail
Share to:
Security in Mobile and Wireless Networks
Author(s)
: Ray Hunt -
Record Detail
XML Detail
Share to:
SECURITY AND COOPERATION IN WIRELESS NETWORKS
Author(s)
: Levente Butty ́an and Jean-Pierre Hubaux -
Record Detail
XML Detail
Share to:
Computer Network Security and Cyber Ethics
Author(s)
: Joseph Migga Kizza -
Record Detail
XML Detail
Share to:
Data Communication Computer Network tutorial
Author(s)
: tutorialspoint.com -
Record Detail
XML Detail
Share to:
Executive Leadership of Cybersecurity
Author(s)
: CONFERENCE OF STATE BANK SUPERVISORS -
Record Detail
XML Detail
Share to:
Deploying a Secure Wireless LAN
Author(s)
: Laura A. Phillips and Tim McCarthy -
Record Detail
XML Detail
Share to:
Building Secure Wireless Networks with 802.11
Author(s)
: JAHANZEB KHAN AND ANIS KHWAJA -
Record Detail
XML Detail
Share to:
Wireless Networks: The Definitive Guide
Author(s)
: Matthew Gast -
Record Detail
XML Detail
Share to:
Wireless Networks: The Definitive Guide
Author(s)
: Matthew Gast -
Record Detail
XML Detail
Share to:
Getting Started with Networking, Wireless, and Security FOR DUMMIES
Author(s)
: Brian Underdahl -
Record Detail
XML Detail
Share to:
Java 2 Network Security
Author(s)
: Marco Pistoia, Duane F. Reller Deepak Gupta, Milind Nagnur, Ashok K. Ramani -
Record Detail
XML Detail
Share to:
Hackers Beware The Ultimate Guide to Network Security
Author(s)
: Eric Cole -
Record Detail
XML Detail
Share to:
INFORMATION TECHNOLOGY SECURITY HANDBOOK
Author(s)
: George Sadowsky, James X. Dempsey, Alan Greenberg, Barbara J. Mack and Alan Schwartz -
Record Detail
XML Detail
Share to:
MacBook Pro for Seniors
Author(s)
: Matthew Hollinder -
Record Detail
XML Detail
Share to:
Network Administration
Author(s)
: Craig Hunt -
Record Detail
XML Detail
Share to:
Information Security Policy: Best Practice Document
Author(s)
: Kenneth Høstland, Per Arne Enstad, Øyvind Eilertsen, Gunnar Bøe -
Record Detail
XML Detail
Share to:
First Page
Previous
1
2
3
4
5
Next
Last Page
Information
Welcome To AMU online Library. Use the search options to find your material in our library.
Search Cluster
Generating search cluster...