Your search returned 39 results.

Sort
Results
1. Books
Guide to network security / Michael E. Whitman, Herbert J. Mattord, David Mackey and Andrew Green by
Edition: International Edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA : Course Technology/Cengage Learning, c2013
Availability: Items available for loan: LRC - Main (1)Collection, call number: Computer Engineering GC QA 76.9.A25 .G85 2013.

2. Books
Ethical and secure computing : a concise module / Joseph Migga Kizza by Series: Undergraduate Topics in Computer Science
Edition: Second Edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Switzerland : Springer, c2019
Availability: Items available for loan: LRC - Main (1)Collection, call number: Digital Forensic GC Z 5643.C65 .K59 2019.

3. Electronic Resources
CompTIA security+ all-in-one exam guide, (Exam SY0-601) / Wm. Arthur Conklin and Greg White by Series: All-in-one
Edition: Sixth Edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : McGraw Hill, 2021
Online resources:
Availability: Items available for loan: LRC - Main (1).

4. Electronic Resources
CompTIA CySA+ study guide : Exam CS0-003 / Mike Chapple and David Seidl by Series: Sybex Study Guide
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: [Place of publication not identified] : Sybex, 2023
Availability: Items available for loan: LRC - Main (1).

5. Books
Information security management principles: an ISEB Certificate / Andy Taylor (editor), David Alexander, Amanda Finch and David Sutton by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Swindon, U.K. : British Computer Society, c2008
Availability: Items available for loan: LRC - Main (1)Collection, call number: Digital Forensic GC QA 76.9.A5 .A44 2008.

6. Books
Computer security / Dieter Gollmann by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chichester, England : Wiley, c1999
Availability: Items available for loan: LRC - Main (1)Collection, call number: Gen. Ed. - CCIT GC QA 76.9.A25 .G65 1999.

7. Books
Principles of information security / Michael E. Whitman and Herbert J. Mattord by
Edition: Second Edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Princeton, New Jersey : Recording for the Blind & Dyslexic, c2005
Availability: Items available for loan: LRC - Main (1)Collection, call number: Digital Forensic GC TK 5105.59 .W45 2005.

8. Books
Cyberseurity and cyberwar : what everyone needs to know / P.W. Singer and Allan Friedman. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Oxford, United Kingdom : Oxford University Press, c2014
Availability: Items available for loan: LRC - Main (1)Collection, call number: Digital Forensic GC QA 76.9.A25 .S56 2014.

9. Books
Introduction to security and network forensics / William J. Buchanan. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, Florida : CRC Press, c2011
Availability: Items available for loan: LRC - Main (1)Collection, call number: Digital Forensic GC QA 76.9.A25 .B83 2011 c.2.

10. Books
Computer forensics : investigating network intrusions and cybercrime.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Clifton Park, New York : EC-Council Press, c2010
Availability: Items available for loan: LRC - Main (1)Collection, call number: Digital Forensic GC TK 5105.59 .C66 2010 c.2.

11. Books
Introduction to security and network forensics / William J. Buchanan. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, Florida : CRC Press, c2011
Availability: Items available for loan: LRC - Main (1)Collection, call number: Digital Forensic GC QA 76.9.A25 .B83 2011 c.1.

12. Books
Unauthorised access : physical penetration testing for IT security teams / Wil Allsopp. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chichester, England : Wiley, c2009
Availability: Items available for loan: LRC - Main (1)Collection, call number: Gen. Ed. - CCIT GC QA 76.9.A25 .A44 2009.

13. Books
Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips and Christopher Steuart by
Edition: Fourth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Australia : Cengage Learning Asia Pte Ltd, c2010
Availability: Items available for loan: LRC - Main (1)Collection, call number: Digital Forensic GC HV 8079.C65 .N45 2010.

14. Books
Computer forensics : investigating network intrusions and cybercrime.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Clifton Park, New York : EC-Council Press, c2010
Availability: Items available for loan: LRC - Main (1)Collection, call number: Digital Forensic GC TK 5105.59 .C66 2010 c.1.

15. Books
Computer forensics jumpstart / Michael G. Solomon, K. Rudolph, Ed Tittle [and others]. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Indiana : Wiley Publishing Incorporation, c2011
Availability: Items available for loan: LRC - Main (1)Collection, call number: Computer Science GC QA 76.9.A25 .C65 2011.

16. Books
Network security : a beginner's guide / Eric Maiwald, by
Edition: THIRD EDITION
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : McGraw Hill Education, c2013
Availability: Items available for loan: LRC - Graduate Studies (1)Collection, call number: Gen. Ed. - CCIT GC TK 5105.59 .M35 2013.

17. Books
Data-driven security : analysis, visualization and dashboards / Jay Jacobs and Bob Rudis by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indiana : Wiley, c2014
Availability: Items available for loan: LRC - Graduate Studies (1)Collection, call number: Gen. Ed. - CCIT GC QA 76.9.A25 .J33 2014.

18. Books
Computer security : principles and practice / William Stallings and Lawrie Brown by
Edition: Third Edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey : Pearson Education, c2015
Availability: Items available for loan: LRC - Graduate Studies (1)Collection, call number: Gen. Ed. - CCIT GC QA 76.9.A25 .S73 2015.

19. Books - Reference
Information assurance handbook : effective computer security and risk management strategies / Corey Schou and Steven Hernandez by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : McGraw Hill Education, c2014
Availability: Items available for loan: LRC - Main (1)Collection, call number: Mobile and Web Applications REF TK 5105.59 .S36 2014.

20. Books - Reference
(ISC)2 CISSP Certified Information Systems Security Professional : official study guide / Mike Chapple, James Michael Stewart and Darril Gibson by
Edition: Eight edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Indiana : John Wiley & Son, Inc., c2018
Availability: Items available for loan: LRC - Main (1)Collection, call number: Mobile and Web Applications REF QA 76.3 .C43 2018.

Pages