University of Zambia Logo University Of Zambia Online Public Access Catalogue

Your search returned 64 results. Subscribe to this search

|
21. CISSP practice exams/ Shon Harris.

by Harris, Shon.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2013Availability: Items available for loan: Main Library [Call number: QA 76.3 HAR 2013] (1).

22. Hacking web apps : detecting and preventing web application security problems / Mike Shema.

by Shema, Mike.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam ; Boston : Syngress, c2012Availability: Items available for loan: Main Library [Call number: TK 5105.59 SHE 2012] (1).

23. Social media security : leveraging social networking while mitigating risk / Michael Cross.

by Cross, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam, [Netherlands] : Syngress, 2014Availability: Items available for loan: Main Library [Call number: HM 742 CRO 2014] (1).

24. The secure information society : ethical, legal and political challenges / J�org Kr�uger, Bertram Nickolay, Sandro Gaycken, editors.

by Kr�uger, J�org | Nickolay, Bertram | Gaycken, Sandro, 1973-.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London ; New York : Springer, c2013Availability: Items available for loan: Main Library [Call number: QA 76.9.A25 SEC 2013] (1).

25. How to Cheat at securing a wireless network/ Chris Hurley, Brian Baker, Christian Barnes, Tony Bautts [five others]

by Hurley, Chris | Baker, Brian | Barnes, Christian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress Publishing, Inc., 2006Availability: Items available for loan: Main Library [Call number: TK 7872.D42 HUR 2006] (2).

26. Managed code rootkits: hooking into runtime environments/ by Erez Metula

by Metula, E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Elsevier, 2011Availability: Items available for loan: Main Library [Call number: QA 76.9.A25 MET 2011] (1).

27. Data breach preparartion and response: breaches are certain, impact is not/ by Kevvie Fowler; Curtis Rose, Technical Editor

by Fowler, K | Rose, C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2016Availability: Items available for loan: Main Library [Call number: TK 5105.59 FOW 2016] (1).

28. International Conference on Secure Communication Systems, 22-23 February 1984 / organised by the Electronics and Computing and Control Divisions of the Institution of Electrical Engineers in association with the British Computer Society, Institute of Acoustics, Institute of Physics.

by International Conference on Secure Communication Systems (1st : 1984 : London, England) International Conference on Secure Communication Systems (1st : 1984 : London, England) International Conference on Secure Communication Systems (1st : 1984 : London, England) International Conference on Secure Communication Systems (1st : 1984 : London, England) | Institution of Electrical Engineers. Electronics Division. Institution of Electrical Engineers. Electronics Division | Institution of Electrical Engineers. Computing & Control Division. Institution of Electrical Engineers. Computing & Control Division.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London ; New York : London ; New York : The Institution, c1984Availability: No items available

29. The protection of property against crime / [by] James Bunting.

by Bunting, James.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Folkestone : Bailey and Swinfen, 1975Availability: No items available

30. Computer crime.

by McKnight, Gerald.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London : Joseph, 1973Availability: No items available

31. Guide to computer network security / Joseph Migga Kizza

by Kizza, Joseph Migga.

Edition: Second editionMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: London : Springer, 2013Availability: Items available for loan: Main Library [Call number: TK 5105.59 KIZ 2013 .] (1).

32. You: for sale : protecting your personal data and privacy online / Stuart Sumner and Mike Rispoli, technical editor.

by Sumner, Stuart | Rispoli, Mike [technical editor].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Elsevier, 2016Availability: Items available for loan: Main Library [Call number: HV 6675 SUM 2016] (1).

33. Achieving systems safety : proceedings of the twentieth Safety-Critical Systems Symposium, Bristol, UK, 7-9th February 2012 / edited by Chris Dale and Tom Anderson

by Dale, Chris, 1953- [editor] | Anderson, Tom, 1947- [editor].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London : Springer, 2012Availability: Items available for loan: Main Library [Call number: TA 169.7 ACH 2012] (1).

34. Essential skills for hackers / Kevin Cardwell ; contributing editor, Henry Dalziel.

by Cardwell, Kevin [author.] | Dalziel, Henry [editor.].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston : Elsevier; 2016Availability: Items available for loan: Main Library [Call number: QA 76.9.A25 CAR 2016] (1).

35. Google hacking for penetration testers / Johnny Long, Bill Garner and Justin Brown

by Long, Johnny [author.] | Gardner, Bill [author.] | Brown, Justin [author.].

Edition: Third edition.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2016Availability: Items available for loan: Main Library [Call number: TK 5105.885 .G66 LON 2016] (1).

36. Cyber security awareness for lawyers / by David Willson and contributing editor, Henry Dalziel.

by Willson, David [author] | Dalziel, Henry [contributing editor.].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Elsevier, 2016Availability: Items available for loan: Main Library [Call number: HV 6773 WIL 2016] (1).

37. The handbook of security / edited by Martin Gill, Professor of Criminology and Director of Perpetuity Research, UK.

by Gill, Martin [editor].

Edition: 2nd edition.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London : Palgrave Macmillan, 2014Online access: Click here to access online Availability: Items available for loan: Main Library [Call number: HV 8290 HAN 2014] (1).

38. Embedded multimedia security systems : algorithms and architectures / Amit Pande and Joseph Zambreno.

by Pande, Amit | Zambreno, Joseph [author].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London : Springer, c2013Availability: Items available for loan: Main Library [Call number: TK 7895.E42 PAN 2013 C.1] (1).

39. Advances in Computers Vol. 94 edited by Ali Hurson, Atif Memon

by Hurson,Ali | Memon,Atif.

Publisher: London : Elsevier , 2014Availability: Items available for loan: Main Library [Call number: QA 76.754 ADV 2014] (1).

40. Computer and information security handbook / edited by John R. Vacca

by Vacca, John R [editor].

Edition: Second edition. Publisher: Amsterdam : Elsevier Inc., 2013Availability: Items available for loan: Main Library [Call number: QA 76.9.A25 COM 2013] (1).