Your search returned 56 results.

41.
Principles of information security / Michael E. Whitman, Herbert J. Mattord

by Whitman, Michael E | Mattord, Herbert J.

Edition: 4th ed.Publication details: Course Technology Cengage Learning 2012Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 A25Whi (2).

42.
What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco

by DeFranco, Joanna F.

Publication details: CRC Press 2014Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK 5105.59 Def (1).

43.
Corporate computer security / Randall J. Boyle, Raymond R. Panko

by Boyle, Randall J | Panko, Raymond R.

Edition: 4th global ed.Publication details: Pearson Education 2015Availability: Items available for loan: ELM LIBRARY (ELM)Call number: QA 76.9 A25Boy (1), FOUNDERS LIBRARY (S2)Call number: QA 76.9 A25Boy (2).

44.
Computer forensics : InfoSec Pro guide / David Cowen

by Cowen, David.

Publication details: McGraw-Hill Education 2013Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 8079 C65Cow (1), HELP UNIVERSITY (HU)Call number: HV 8079 C65Cow (1).

45.
(The) basics of information security : understanding the fundamentals of InfoSec in theory and practice / Jason Andress

by Andress, Jason.

Publication details: Elsevier/Syngress 2011Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 A25And (2).

46.
Cognitive hack : the new battleground in cybersecurity... the human mind / James Bone

by Bone, James.

Publication details: CRC Press 2017Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HF 5548.37 Bon (1).

47.
Computer security : art and science / Matt Bishop, Elisabeth Sullivan, Michelle Ruppel

by Bishop, Matt | Sullivan, Elisabeth | Ruppel, Michelle | EMO.

Edition: 2nd ed.Publication details: Addison-Wesley 2019Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 Bis (1).

48.
Future crimes : inside the digital underground and the battle for our connected world / Marc Goodman

by Goodman, Marc | BC.

Publication details: Anchor Books 2016Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HV 6773 Goo (1).

49.
Cyber smart : five habits to protect your family, money, and identity from cyber criminals / Bart R. McDonough

by McDonough, Bart R | BC.

Publication details: John Wiley & Sons, Inc. 2019Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK 5105.59 Mac (1).

50.
(A) data-driven computer defense : a way to improve any computer defense / Roger A. Grimes

by Grimes, Roger A | BC.

Edition: 2nd ed.Publication details: sn 2019Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: QA 76.9 Gri (1).

51.
Computer and internet security : a hands-on approach / Wenliang Du

by Du,Wenliang | EMO.

Edition: 2nd ed.Publication details: sn 2019Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK 5105.59 Duw (1).

52.
Introductory computer forensics : a hands-on practical approach / Xiaodong Lin

by Lin, Xiaodong | Springer (Obtain eBook from Library counter).

Publication details: Springer 2018Online access: HELP eBooks Repository Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA 76.9 Lin (1).

53.
Understanding cryptography : a textbook for students and practitioners / Christof Paar, Jan Pelzl

by Paar, Christof | Pelzl, Jan | Springer (Obtain eBook from Library counter).

Publication details: Springer 2010Online access: HELP eBooks Repository Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA 76.9 Paa (1).

54.
Multimedia big data computing for IoT applications : concepts, paradigms and solutions / Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, editors

by Tanwar, Sudeep | Tyagi, Sudhanshu | Kumar, Neeraj | Springer (Obtain eBook from Library counter).

Publication details: Springer 2020Online access: HELP eBooks Repository Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: Q 342 Mul (1).

55.
(The) security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll

by Landoll, Douglas J | EMO.

Edition: 3rd ed.Publication details: CRC Press 2021Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HF 5548.37 Lan (1).

56.
Managing risk in information systems / Darril Gibson, Andy Igonor

by Gibson, Darril | Igonor, Andy | EMO.

Edition: 3rd ed.Publication details: Jones & Bartlett Learning 2022Availability: Items available for loan: ELM LIBRARY (ELM)Call number: QA 76.9 Gib (1).

Copyright © 2023 HELP Learning Resource Centre. All Rights Reserved.

Powered by Koha