Your search returned 57 results.

21.
Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data / Terence V. Lillard ... [et al.]

by Lillard, Terence V.

Publication details: Elsevier/Syngress 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: HV8079 C65Dig (2).

23.
Computer forensics and cyber crime : an introduction / Marjie T. Britz

by Britz, Marjie T.

Edition: 2nd ed.Publication details: Prentice Hall 2009Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Bri (1).

24.
IT audit, control, and security / Robert Moeller

by Moeller, Robert.

Publication details: J. Wiley 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: T58.5 Moe (1), ELM LIBRARY (ELM)Call number: T58.5 Moe (1).

25.
Information security risk analysis / Thomas R. Peltier

by Peltier, Thomas R | Casey, Eoghan | Altheide, Cory.

Edition: 3rd ed.Publication details: CRC Press 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Pel (1).

26.
Management of information security / Michael Whitman, Herbert Mattord

by Whitman, Michael | Mattord, Herbert.

Edition: 3rd ed.Publication details: Course Technology Cengage Learning 2010Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA76.9 A25Whi (1). Damaged (1).

27.
Investigative data mining for security and criminal detection / Jesus Mena

by Mena, Jesus.

Publication details: Butterworth/Heinemann 2003Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 D343Men (1), ELM LIBRARY (ELM)Call number: QA76.9 D343Men (1), FOUNDERS LIBRARY (S2)Call number: QA76.9 D343Men (1).

28.
Hacking Exposed computer forensics : secrets and solutions / Aaron Philipp, David Cowen, Chris Davis

by Philipp, Aaron | Cowen, David | Davis, Chris.

Edition: 2nd ed.Publication details: McGraw-Hill 2010Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: HV8079 C65Phi (1).

29.
(The) Symantec guide to home internet security / Andrew Conry-Murray and Vincent Weafer

by Conry-Murray, Andrew | Weafer, Vincent.

Publication details: Addison-Wesley 2006Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA76.9 A25Con (1).

30.
E-security law and strategy / Zaid Hamzah

by Zaid Hamzah.

Publication details: LexisNexis 2005Availability: Items available for loan: ELM LIBRARY (ELM)Call number: K564 C6Zai (1).

31.
Computer security / Dieter Gollmann

by Gollmann, Dieter.

Edition: 2nd ed.Publication details: J. Wiley 2006Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Gol (1).

37.
Computer security handbook / by R. A. Elbra.

by Elbra, R. A.

Publication details: NCC Blackwell 1992Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Elb. (1).

38.
Protection and security on the information superhighway / Frederick B. Cohen.

by Cohen, Frederick B.

Publication details: J. Wiley 1995Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Coh. (1).

39.
Computer security management / Karen A. Forcht.

by Forcht, Karen A.

Publication details: Boyd & Fraser 1994Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25For. (1).

40.
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 2nd ed.Publication details: Prentice Hall International 1999Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK5105.59 Sta. (1).

Copyright © 2024 HELP Learning Resource Centre. All Rights Reserved.

Powered by Koha