Your search returned 17 results.

Sort
Results
1.
Access Contested: Security Identity And Resistance In Asian Cyberspace/ Dited By Ronald Deibert Et.Al. Series: ; 0
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cambridge Ma Usa: Massachusetts Institute Of Technology 2012
Availability: Items available for loan: Africa University Main Library (1)Call number: HM851ACC2011.

2.
Cissp : Certified Information Systems Security Professional Study Guide / Ed Tittel James Michael Stewart Mike Chapple. by Series: ; 0
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: San Francisco Calif. London : Sybex C2004.
Availability: Items available for loan: Africa University Main Library (1)Call number: QA763TIT2004.

3.
The Principles Of Business Computing
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Kenwyn : Juta 1988.
Availability: Items available for loan: Africa University Main Library (4)Call number: HD5548.2 PRI 1988, HD5548.2 PRI 1988, HD5548.2 PRI 1988, HD5548.2 PRI 1988.

4.
Hacking Exposed Network Security Secrets And Solutions Stuart Mcclure Joel Scambray George Kurtz by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berkeley Calif. : Osborne/Mcgraw-Hill C1999.
Availability: Items available for loan: Africa University Main Library (1)Call number: TK5105.59. MCC 1999.

5.
Handbook Of Information Security Management 1996 1997 Yearbook Micki Krause And Harold F Tipton Editors
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : Auerbach C1996.
Availability: Items available for loan: Africa University Main Library (1)Call number: QA76.9 HAN 1996.

6.
Firewalls 24 Seven Matthew Strebe And Charles Perkins by Series: Oxfam Focus On Gender
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: San Francisco: Sybex C2000.
Availability: Items available for loan: Africa University Main Library (1)Call number: TK5105.59 STR 2000.

7.
Privacy For Sale How Computerization Has Made Everyones Private Life An Open Secret Jeffrey Rothfeder by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Simon And Schuster C1992.
Availability: Items available for loan: Africa University Main Library (1)Call number: HG3751.7 ROT 1992.

8.
Information Systems Security Royal P Fisher by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Englewood Cliffs N.J. : Prentice-Hall C1984.
Availability: Items available for loan: Africa University Main Library (1)Call number: HF5548.2 FIS 1984.

9.
Ccsa Next Generation Check Point Certified Security Administrator Study Guide Exam 156 210 Syngress Media Inc
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Osborne/Mcgraw-Hill 2002.
Availability: Items available for loan: Africa University Main Library (1)Call number: QA76.3 CCS 2002.

10.
Cryptography And Network Security Principles And Practice William Stallings by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey : Prentice Hall C2006.
Availability: Items available for loan: Africa University Main Library (2)Call number: TK5105.59 STA 2006, TK5105.59 STA 2006.

11.
A Classical Introduction To Cryptography Applications For Communications Security By Serge Vaudenay by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer 2005.
Availability: Items available for loan: Africa University Main Library (1)Call number: QA76.9 VAU 2005.

12.
Penetration Testing And Network Defense Andrew Whitaker Daniel P Newman by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis In : Cisco Press C2006.
Availability: Items available for loan: Africa University Main Library (1)Call number: TK5105.59 WHI 2006.

13.
Handbook Of Computer Networks Distributed Networks Network Planning Control Management And New Trends And Applications Vol 3 Edited By Hossein Bidgoli
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken N.J. : John Wiley And Sons Inc. C2008.
Availability: Items available for loan: Africa University Main Library (1)Call number: TK5105.5 .HAN 2008.

14.
15.
Information security management : concepts and practice / Bel G. Raggad. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : CRC Press/Taylor & Francis, c2010
Availability: Items available for loan: Africa University Main Library (1)Call number: QA76.9 A25 RAG 2010.

16.
Cyber crime, security and digital intelligence / Mark Johnson. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Farnham, Surrey, England ; Burlington, VT : Gower, [2013]
Availability: Items available for loan: Africa University Law Library (1)Call number: HV6763 JOH 2013.

17.
Cyber security : law and guidance / [edited by] Helen Wong. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London ; Dublin ; Edinburgh ; New York ; New Delhi ; Sydney : Bloomsbury Professional, [2018]
Availability: Items available for loan: Africa University Law Library (6)Call number: K564 .C6 CYB 2018, K564 .C6 CYB 2018, K564 .C6 CYB 2018, K564 .C6 CYB 2018, K564 .C6 CYB 2018, K564 .C6 CYB 2018.

 

©    Africa University. All Rights Reserved