Your search returned 56 results.

Sort
Results
1.
Computer and Information Security Handbook / edited by Vacca, John by
Edition: Second edition /
Material type: Text Text
Publication details: Amsterdam: Morgan Kaufmann, 2013
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: QA76.9.A25 COM.

2.
Cloud security : a comprehensive guide to secure cloud computing / by Ronald L. Krutz and Russell Dean Vines [textbook] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi ; Wiley, 2010
Availability: Items available for loan: Harare Institute of Technology Main Library (2)Call number: TK5105.88813 KRU, ...

3.
The ABA cybersecurity handbook : a resource for attorneys, law firms, and business professionals / edited by Jill D. Rhodes and Vincent I. Polley by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Chicago, Illinois : American Bar Association, 2013
Other title:
  • Cybersecurity handbook
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: KF318 RHO.

4.
New perspectives in international development / edited by Melissa Butcher and Theo Papaioannou [textbook] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London : Bloomsbury Academic, 2013
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: HC340 NEW.

5.
Routledge handbook of food and nutrition security / edited by Bill Pritchard, Rodomiro Ortiz and Meera Shekar. [textbook] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: London ; New York : Routledge Taylor & Francis Group, 2016
Availability: Items available for loan: Harare Institute of Technology Main Library (4)Call number: HANDBOOK HD9000.5 ROU, ...

6.
Retail crime, security, and loss prevention : an encyclopedic reference / edited by Charles A. Sennewald and John H. Christman. [textbook] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington, MA : Butterworth-Heinemann, 2008
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: HF5429.27 RET.

7.
Cybercrime and espionage : an analysis of subversive multivector threats / by Will Gragido and John Pirc; Russ Roger, technical editor [textbook] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam : Elsevier, 2011
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: HV6773 GRA.

8.
9.
Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips and Christopher Steuart. [textbook] by
Edition: Fourth edition /
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA : Course Technology Cengage Learning 2010
Other title:
  • Computer forensics and investigations
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: HV8079 NEL.

10.
Security and loss prevention : an introduction / by Philip P. Purpura [textbook] by
Edition: Sixth edition /
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Amsterdam : Elsevier, 2013
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: HV8290 PUR.

11.
How to Define and Build an Effective Cyber Threat Intelligence Capability / by Dalziel, Henry [textbook] by
Material type: Text Text
Publication details: Boston : Elsevier , 2015
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: HV6773 DAL.

12.
Windows Forensic Analysis Toolkit : by Carvey Harlan [textbook] by
Edition: Fourth edition /
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: United States of America: Elsevier, 2014
Availability: Items available for loan: Harare Institute of Technology Main Library (4)Call number: HV8079.C65 HAR, ...

13.
Internet fraud casebook : the World Wide Web of deceit / edited by Joseph T. Wells. [textbook] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Hoboken, N.J. : John Wiley & Sons, 2010
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: HV6773 INT.

14.
Healthcare fraud : auditing and detection guide / by Rebecca Saltiel Busch [textbook] by
Edition: Second edition/
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken : John Wiley & Sons, 2012
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: KF38.A4 BUS.

15.
The internationalization of internal conflicts : edited by Amy L. Freedman threatening the state / [textbook] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London : Routledge, 2014
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: KZ6397 INT.

16.
Strategic intelligence management : national security imperatives and information and communications technologies / edited by Babak Akhgar and Simeon Yates [textbook] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Amsterdam : Elsevier, 2013
Availability: Items available for loan: Harare Institute of Technology Main Library (2)Call number: QA76.25 AKH, ...

17.
Securing SQL server : protecting your database from attackers / by Denny Cherry ; technical editor, Michael Cross [textbook] by
Edition: Second edition /
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam : Elsevier, 2012
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: QA76.73.S67.

18.
Applied cryptography : protocols, algorithms, and source code in C / by Bruce Schneier [textbook] by
Edition: Second edition /
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York : Wiley, 1996
Availability: Items available for loan: Harare Institute of Technology Main Library (4)Call number: QA76.9.A25 SCH, ...

19.
Security engineering : a guide to building dependable distributed systems / by Ross J. Anderson [textbook] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : John Wiley, 2001
Availability: Items available for loan: Harare Institute of Technology Main Library (5)Call number: QA76.9.A54 AND, ...

20.
Computer Security Art and Science / [textbook] by Matt Bishop by
Material type: Text Text
Publication details: New Delhi : Pearson, 2003
Availability: Items available for loan: Harare Institute of Technology Main Library (1)Call number: QA76.9.A25 BIS.

Pages