Your search returned 56 results.

21.
Investigator's guide to steganography / Gregory Kipper.

by Kipper, Gregory.

Publication details: Auerbach Publications 2004Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Kip. (1).

27.
Computer security / Dieter Gollmann

by Gollmann, Dieter.

Edition: 2nd ed.Publication details: J. Wiley 2006Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Gol (1).

28.
E-security law and strategy / Zaid Hamzah

by Zaid Hamzah.

Publication details: LexisNexis 2005Availability: Items available for loan: ELM LIBRARY (ELM)Call number: K564 C6Zai (1).

29.
(The) Symantec guide to home internet security / Andrew Conry-Murray and Vincent Weafer

by Conry-Murray, Andrew | Weafer, Vincent.

Publication details: Addison-Wesley 2006Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA76.9 A25Con (1).

30.
Hacking Exposed computer forensics : secrets and solutions / Aaron Philipp, David Cowen, Chris Davis

by Philipp, Aaron | Cowen, David | Davis, Chris.

Edition: 2nd ed.Publication details: McGraw-Hill 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: HV8079 C65Phi (1).

31.
Investigative data mining for security and criminal detection / Jesus Mena

by Mena, Jesus.

Publication details: Butterworth/Heinemann 2003Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 D343Men (1), ELM LIBRARY (ELM)Call number: QA76.9 D343Men (1), FOUNDERS LIBRARY (S2)Call number: QA76.9 D343Men (1).

32.
Management of information security / Michael Whitman, Herbert Mattord

by Whitman, Michael | Mattord, Herbert.

Edition: 3rd ed.Publication details: Course Technology Cengage Learning 2010Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA76.9 A25Whi (1). Damaged (1).

33.
Information security risk analysis / Thomas R. Peltier

by Peltier, Thomas R | Casey, Eoghan | Altheide, Cory.

Edition: 3rd ed.Publication details: CRC Press 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Pel (1).

35.
IT audit, control, and security / Robert Moeller

by Moeller, Robert.

Publication details: J. Wiley 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: T58.5 Moe (1), ELM LIBRARY (ELM)Call number: T58.5 Moe (1).

36.
Computer forensics and cyber crime : an introduction / Marjie T. Britz

by Britz, Marjie T.

Edition: 2nd ed.Publication details: Prentice Hall 2009Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Bri (1).

37.
Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data / Terence V. Lillard ... [et al.]

by Lillard, Terence V.

Publication details: Elsevier/Syngress 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: HV8079 C65Dig (2).

38.
iOS forensic analysis for iPhone, iPad and iPod touch / Sean Morrissey

by Morrissey, Sean.

Publication details: Apress 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: HV 6773 Mor (2).

39.
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 / Barry L. Williams

by Williams, Barry L.

Publication details: CRC Press 2013Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 A25Wil (1). Checked out (1).

40.
Fundamentals of communications and networking / Michael G. Solomon, David Kim, and Jeffrey L. Carrell

by Solomon, Michael G | Kim, David | Carrell, Jeffrey L.

Edition: 2nd ed.Publication details: Jones & Bartlett Learning 2015Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 A25Sol (2).

Copyright © 2023 HELP Learning Resource Centre. All Rights Reserved.

Powered by Koha