Your search returned 36 results.

Sort
Results
1.
Computer and Information Security Handbook / edited by Vacca, John by
Edition: Second edition /
Material type: Text Text
Publication details: Amsterdam: Morgan Kaufmann, 2013
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: QA76.9.A25 COM.

2.
Cloud security : a comprehensive guide to secure cloud computing / by Ronald L. Krutz and Russell Dean Vines [textbook] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi ; Wiley, 2010
Availability: Items available for loan: Harare Institute of Technology Main Library (2)Call number: TK5105.88813 KRU, ...

3.
The ABA cybersecurity handbook : a resource for attorneys, law firms, and business professionals / edited by Jill D. Rhodes and Vincent I. Polley by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Chicago, Illinois : American Bar Association, 2013
Other title:
  • Cybersecurity handbook
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: KF318 RHO.

4.
5.
Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips and Christopher Steuart. [textbook] by
Edition: Fourth edition /
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA : Course Technology Cengage Learning 2010
Other title:
  • Computer forensics and investigations
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: HV8079 NEL.

6.
Windows Forensic Analysis Toolkit : by Carvey Harlan [textbook] by
Edition: Fourth edition /
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: United States of America: Elsevier, 2014
Availability: Items available for loan: Harare Institute of Technology Main Library (4)Call number: HV8079.C65 HAR, ...

7.
Internet fraud casebook : the World Wide Web of deceit / edited by Joseph T. Wells. [textbook] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Hoboken, N.J. : John Wiley & Sons, 2010
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: HV6773 INT.

8.
Healthcare fraud : auditing and detection guide / by Rebecca Saltiel Busch [textbook] by
Edition: Second edition/
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken : John Wiley & Sons, 2012
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: KF38.A4 BUS.

9.
Securing SQL server : protecting your database from attackers / by Denny Cherry ; technical editor, Michael Cross [textbook] by
Edition: Second edition /
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam : Elsevier, 2012
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: QA76.73.S67.

10.
Applied cryptography : protocols, algorithms, and source code in C / by Bruce Schneier [textbook] by
Edition: Second edition /
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York : Wiley, 1996
Availability: Items available for loan: Harare Institute of Technology Main Library (4)Call number: QA76.9.A25 SCH, ...

11.
Security engineering : a guide to building dependable distributed systems / by Ross J. Anderson [textbook] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : John Wiley, 2001
Availability: Items available for loan: Harare Institute of Technology Main Library (5)Call number: QA76.9.A54 AND, ...

12.
Computer Security Art and Science / [textbook] by Matt Bishop by
Material type: Text Text
Publication details: New Delhi : Pearson, 2003
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: QA76.9.A25 BIS.

13.
Elements of computer security / by David Salomon [textbook] by Series: Mackie, Ian ;
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer-Verlag, 2010
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: QA76.9.A25 SAL.

14.
Security in Computing / [textbook] by Pfleeger Charles and Shari Lawrence by
Edition: Third edition /
Material type: Text Text
Publication details: Dew Delhi : Prentice-Hall of India, 2005
Availability: Items available for loan: Harare Institute of Technology Main Library (2)Call number: QA76.9.A25 PFL, ...

15.
Network security bible / by Eric Cole, Ronald Krutz and James W. Conley [Textbook] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Chichester : Wiley ; John Wiley [distributor], c2009
Availability: Items available for loan: Harare Institute of Technology Main Library (2)Call number: QA76.9.A25 COL, ...

16.
Securing the cloud : cloud computer security techniques and tactics / by Vic J.R. Winkler. [Textbook] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham, MA : Syngress/Elsevier, 2011
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: QA76.585 WIN.

17.
The basics of IT audit : purposes, processes, and practical information / by Stephen D. Gantz. [textbook] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam : Syngress, an imprint of Elsevier, 2014
Availability: Items available for loan: Harare Institute of Technology Main Library (7)Call number: T58.5 GAN, ...

18.
Cybersecurity for beginners / Raef Meeuwisse by
Edition: Second edition
Material type: Text Text
Hythe, Kent : Cyber Simplicity, 2017
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: QA76.9.A25 MEE.

19.
Cyber Influence and Cognitive Threats / edited Vladlena Benson and John McAlaney by
Material type: Text Text
London : Elsevier, AP Academic Press, an Imprint of Elsevier [2020]
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: T14.5 CYB.

20.
Hardware security : a hands-on learning approach/ Bhunia, Swarup by
Material type: Text Text
Cambridge, MA : Morgan Kaufmann, 2019
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: QA76.9.A25 BHU.

Pages