|
41.
|
Managing cyber attacks in International law, business and relations : in search of Cyber peace / Scott L. Shackelford, JD, PHD, Kelley School of Business, Indiana University.
by Shackelford, Scott J. Publisher: Cambridge : Cambridge University Press, 2015Availability: Items available for loan: Main Library
[Call number: KZ 6718 SHA 2014]
(1).
|
|
42.
|
Computer and information security handbook / edited by John R. Vacca.
by Vacca, John R [editor]. Edition: Third edition. Publisher: Cambridge : Elsevier Inc., 2017Availability: Items available for loan: Main Library
[Call number: QA 76.9.A25 COM 2017]
(7).
|
|
43.
|
Operating system forensics / Ric Messier, Kevin Mackay, Technical Editor
by Messier, Ric [author] | Mackay, Kevin [Technical editor]. Publisher: Amsterdam : Elsevier, 2016Availability: Items available for loan: Main Library
[Call number: HV 8079.C65 MES 2016]
(1).
|
|
44.
|
Cybersecurity ops with bash : attack, defend, and analyze from the command line / Paul Troncone and Carl Albing
by Troncone, Paul [author] | Albing, Carl [author]. Publisher: Beijing : O'Reilly Media, 2019Availability: Items available for loan: Main Library
[Call number: QA 76.9.A25 TRO 2019]
(1).
|
|
45.
|
Zero trust networks : building secure systems in untrusted network / Evan Gilman.
by Gilman, Evan | Barth, Doug. Publisher: Sebastopol, CA : O'Reilly Media , 2017Online access: Click here to access online Availability: Items available for loan: Main Library
[Call number: QA 76.9 GIL 2017]
(1).
|
|
46.
|
SecureCSocial : secure cloud-based social network / Pradeep K. Atrey, University at Albany, USA and Kasun Senevirathna, University of Winnipeg, Canada.
by Atrey, Pradeep K | Senevirathna, Kasun [author]. Publisher: New Jersey : World Scientific, 2020Availability: Items available for loan: Main Library
[Call number: TK 5105.59 ATR 2019]
(1).
|
|
47.
|
Network security through data analysis : from data to action / Michael Collins.
by Collins, Michael. Edition: 2nd edition. Publisher: Sebastopol : O'Reilly Media, Inc., 2017Availability: Items available for loan: Main Library
[Call number: TK 5105.59 COL 2017]
(1).
|
|
48.
|
CompTIA security+ guide to network security fundamentals / Mark Ciampa, Ph.D.
by Ciampa, Mark [author]. Edition: Fifth edition. Publisher: Boston : Cengage Learning, 2015Availability: Items available for loan: Main Library
[Call number: TK 5105.59 CIA 2015]
(26).
|
|
49.
|
Elementary information security / Richard E. Smith.
by Smith, Richard E [author]. Publisher: Burlington, MA : Jones & Bartlett Learning, 2013Availability: Items available for loan: Main Library
[Call number: QA 76.9. A25 SMI 2013.]
(5).
|
|
50.
|
Development of a two-factor authentication for vehicle parking space control based on automatic number plate recognition and radio frequency identification / Friday Chisowa Chazanga.
by Chazanga, Friday Chisowa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Lusaka : University of Zambia, 2019Online access: Click here to access online Availability: Items available for loan: Main Library
[Call number: THESIS (MSc) CHA 2019.]
(1).
|
|
51.
|
Wireless local area network (s) security : a case study on some business centres in Lusaka central district / Frank Sakabanga Samui.
by Samui, Frank Sakabanga. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Lusaka : University of Zambia, 2020Availability: Items available for reference: Main Library
[Call number: THESIS M.ENG SAM 2020]
(1).
|
|
52.
|
Auditing IT infrastructures for compliance / Martin M. Weiss and Michael G. Solomon.
by Weiss, Martin M [author] | Solomon, Michael G [author.]. Publisher: Sudbury : Jones & Bartlett Learning, 2011Availability: Items available for loan: Main Library
[Call number: QA 76.9.A25 WEI 2011.]
(1).
|
|
53.
|
An investigation into cyber security threats posed by insiders : a case of public organisations / Melissa Kaemby Chinyemba
by Chinyemba, Melissa Kaemby. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Lusaka : The University of Zambia, 2019Availability: Items available for loan: Main Library
[Call number: THESIS (M.ENG) CHI 2019]
(1).
|
|
54.
|
Development of a two-factor authentication for vehicle parking space control based on automatic number plate recognition and radio frequency indentification / Friday Chisowa Chazanga.
by Chazanga, Friday Chisowa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Lusaka : The University of Zambia, 2019Online access: Click here to access online Availability: No items available
|
|
55.
|
Assessment of the security systems in selected libraries of higher learning institutions in Zambia / Bestain Hampwaye.
by Hampwaye, Bestain. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Lusaka : The University of Zambia, 2022Online access: Click here to access online Availability: Items available for loan: Main Library
[Call number: THESIS (MLIS) HAM 2022.]
(1).
|
|
56.
|
A framework for cyber security risk modeling and mitigation in smart grid communication and control systems/ Lukumba Phiri.
by Phiri, Lukumba. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Lusaka: The University of Zambia, 2023Online access: Click here to access online Availability: Items available for loan: Main Library
[Call number: THESIS (PHD) PHI 2023]
(1).
|
|
57.
|
Strengthening web application security through technical measures / Mike Daka.
by Daka, Mike. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Lusaka : The University of Zambia, 2023Availability: Items available for loan: Main Library
[Call number: THESIS (M.ENG) DAK 2023]
(1).
|
|
58.
|
(ISC)2 CCSP certified cloud security professional : official study guide / Ben Malisow.
by Malisow, Ben, author. Edition: Second edition. Publisher: Hoboken, NJ : Sybex, Wiley Brand, 2020Availability: Items available for loan: Main Library
[Call number: QA 76.585 MAL 2020]
(2).
|
|
59.
|
CompTIA cybersecurity analyst (CySA+) study guide : exam CSO-002 / Mike Chapple and David Seidl.
by Chapple, Mike [author] | Seidl, David [author]. Edition: Second edition. Publisher: Hoboken : John Wiley & Sons, Inc., 2020Availability: Items available for loan: Main Library
[Call number: QA 76.9.A25 CHA 2020]
(5).
|
|
60.
|
Windows registry forensics : advanced digital forensic analysis of the windows registry / Harlan Carvey.
by Harlan, Carvey [author]. Edition: Second edition. Publisher: Cambridge : Syngress, 2016Availability: Items available for loan: Main Library
[Call number: HV 8079.C65 CAR 2016]
(1).
|