University of Zambia Logo University Of Zambia Online Public Access Catalogue

Your search returned 64 results. Subscribe to this search

|
41. Managing cyber attacks in International law, business and relations : in search of Cyber peace / Scott L. Shackelford, JD, PHD, Kelley School of Business, Indiana University.

by Shackelford, Scott J.

Publisher: Cambridge : Cambridge University Press, 2015Availability: Items available for loan: Main Library [Call number: KZ 6718 SHA 2014] (1).

42. Computer and information security handbook / edited by John R. Vacca.

by Vacca, John R [editor].

Edition: Third edition. Publisher: Cambridge : Elsevier Inc., 2017Availability: Items available for loan: Main Library [Call number: QA 76.9.A25 COM 2017] (7).

43. Operating system forensics / Ric Messier, Kevin Mackay, Technical Editor

by Messier, Ric [author] | Mackay, Kevin [Technical editor].

Publisher: Amsterdam : Elsevier, 2016Availability: Items available for loan: Main Library [Call number: HV 8079.C65 MES 2016] (1).

44. Cybersecurity ops with bash : attack, defend, and analyze from the command line / Paul Troncone and Carl Albing

by Troncone, Paul [author] | Albing, Carl [author].

Publisher: Beijing : O'Reilly Media, 2019Availability: Items available for loan: Main Library [Call number: QA 76.9.A25 TRO 2019] (1).

45. Zero trust networks : building secure systems in untrusted network / Evan Gilman.

by Gilman, Evan | Barth, Doug.

Publisher: Sebastopol, CA : O'Reilly Media , 2017Online access: Click here to access online Availability: Items available for loan: Main Library [Call number: QA 76.9 GIL 2017] (1).

46. SecureCSocial : secure cloud-based social network / Pradeep K. Atrey, University at Albany, USA and Kasun Senevirathna, University of Winnipeg, Canada.

by Atrey, Pradeep K | Senevirathna, Kasun [author].

Publisher: New Jersey : World Scientific, 2020Availability: Items available for loan: Main Library [Call number: TK 5105.59 ATR 2019] (1).

47. Network security through data analysis : from data to action / Michael Collins.

by Collins, Michael.

Edition: 2nd edition. Publisher: Sebastopol : O'Reilly Media, Inc., 2017Availability: Items available for loan: Main Library [Call number: TK 5105.59 COL 2017] (1).

48. CompTIA security+ guide to network security fundamentals / Mark Ciampa, Ph.D.

by Ciampa, Mark [author].

Edition: Fifth edition. Publisher: Boston : Cengage Learning, 2015Availability: Items available for loan: Main Library [Call number: TK 5105.59 CIA 2015] (26).

49. Elementary information security / Richard E. Smith.

by Smith, Richard E [author].

Publisher: Burlington, MA : Jones & Bartlett Learning, 2013Availability: Items available for loan: Main Library [Call number: QA 76.9. A25 SMI 2013.] (5).

50. Development of a two-factor authentication for vehicle parking space control based on automatic number plate recognition and radio frequency identification / Friday Chisowa Chazanga.

by Chazanga, Friday Chisowa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Lusaka : University of Zambia, 2019Online access: Click here to access online Availability: Items available for loan: Main Library [Call number: THESIS (MSc) CHA 2019.] (1).

51. Wireless local area network (s) security : a case study on some business centres in Lusaka central district / Frank Sakabanga Samui.

by Samui, Frank Sakabanga.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Lusaka : University of Zambia, 2020Availability: Items available for reference: Main Library [Call number: THESIS M.ENG SAM 2020] (1).

52. Auditing IT infrastructures for compliance / Martin M. Weiss and Michael G. Solomon.

by Weiss, Martin M [author] | Solomon, Michael G [author.].

Publisher: Sudbury : Jones & Bartlett Learning, 2011Availability: Items available for loan: Main Library [Call number: QA 76.9.A25 WEI 2011.] (1).

53. An investigation into cyber security threats posed by insiders : a case of public organisations / Melissa Kaemby Chinyemba

by Chinyemba, Melissa Kaemby.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Lusaka : The University of Zambia, 2019Availability: Items available for loan: Main Library [Call number: THESIS (M.ENG) CHI 2019] (1).

54. Development of a two-factor authentication for vehicle parking space control based on automatic number plate recognition and radio frequency indentification / Friday Chisowa Chazanga.

by Chazanga, Friday Chisowa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Lusaka : The University of Zambia, 2019Online access: Click here to access online Availability: No items available

55. Assessment of the security systems in selected libraries of higher learning institutions in Zambia / Bestain Hampwaye.

by Hampwaye, Bestain.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Lusaka : The University of Zambia, 2022Online access: Click here to access online Availability: Items available for loan: Main Library [Call number: THESIS (MLIS) HAM 2022.] (1).

56. A framework for cyber security risk modeling and mitigation in smart grid communication and control systems/ Lukumba Phiri.

by Phiri, Lukumba.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Lusaka: The University of Zambia, 2023Online access: Click here to access online Availability: Items available for loan: Main Library [Call number: THESIS (PHD) PHI 2023] (1).

57. Strengthening web application security through technical measures / Mike Daka.

by Daka, Mike.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Lusaka : The University of Zambia, 2023Availability: Items available for loan: Main Library [Call number: THESIS (M.ENG) DAK 2023] (1).

58. (ISC)2 CCSP certified cloud security professional : official study guide / Ben Malisow.

by Malisow, Ben, author.

Edition: Second edition. Publisher: Hoboken, NJ : Sybex, Wiley Brand, 2020Availability: Items available for loan: Main Library [Call number: QA 76.585 MAL 2020] (2).

59. CompTIA cybersecurity analyst (CySA+) study guide : exam CSO-002 / Mike Chapple and David Seidl.

by Chapple, Mike [author] | Seidl, David [author].

Edition: Second edition. Publisher: Hoboken : John Wiley & Sons, Inc., 2020Availability: Items available for loan: Main Library [Call number: QA 76.9.A25 CHA 2020] (5).

60. Windows registry forensics : advanced digital forensic analysis of the windows registry / Harlan Carvey.

by Harlan, Carvey [author].

Edition: Second edition. Publisher: Cambridge : Syngress, 2016Availability: Items available for loan: Main Library [Call number: HV 8079.C65 CAR 2016] (1).