Your search returned 36 results.

Sort
Results
21. Books
Certified secure computer use

Publication details: EC-Council, n.dAvailability: Items available for loan: (1). Main (9)Call number: QA76 .F68x n.d, ...
22. Books
CompTIA security+ study guide: exam SY0-301

by Dulaney, Emmett.

Edition: 5th ed. Publication details: Indianapolis: Wiley Technology, 2011Availability: Items available for loan: Main (1)Call number: QA76.3 .D8228 2011.
23. Books
CompTIA® Security+™ study guide: SYO-401

by Dulaney, Emmett | Easttom, Chuck.

Edition: 6th ed. Publication details: Hoboken: John Wiley & Sons, 2014Availability: Items available for loan: Main (1)Call number: QA76.3 .D8229 2014.
24. Books
API security in action

by Madden, Neil.

Publication details: Shelter Island, NY: Manning Publications, 2020Availability: Items available for loan: Main (1)Call number: QA76.76.A65 M317 2020.
25. Books
Protective security: creating military-grade defenses for your digital business

by Seaman Jim.

Publication details: U.K.: Apress, 2021Availability: Items available for loan: Main (1)Call number: QA76.9.A25 S42x 2021.
26. Periodicals
International Journal of Information Security Privacy and Digital forensics

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Lagos Nigeria Computer Society 2021Availability: Items available for reference: Main: Not for loan (2)Call number: QA76.9 .A25 I556, ...
27. Books
Secrets of a cyber security architect

by Schoenfield, Brook S. E.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boca Raton, FL: CRC Press, 2023Availability: Items available for loan: Main (1)Call number: TK5105.59 .S36x 2023.
28. Books
Ethical hacker's penetration testing guide: vulnerability assessment and attack simulation on web, mobile,network services and wireless networks

by Samir Kumar Rakshit.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: BPB Publications: India, 2022Availability: Items available for loan: Main (1)Call number: QA76.9 .A25 R35x 2022.
29. Books
Microsoft Azure security technologies (AZ-500) a certification guide: get qualified to secure azure AD, network, compute, storage and data services through security center, sentinel and other Azure security best practices

by Sharma, Jayant.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: India: BPB, 2022Availability: Items available for loan: Main (1)Call number: QA76.9 .A25 S53x 2022.
30. Books
Cryptography and network security: demystifying the ideas of network security, cryptographic algorithms, wireless security, IP security, system security, and email security

by Trivedi, Bhushan.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: India; BPB, 2022Availability: Items available for loan: Main (1)Call number: TK5105.59 .T75x 2022.
31. Books
Learn penetration testing with python 3.x: perform offensive pentesting and prepare red teaming to prevent network attacks and web vulnerabilities

by Elghaly, Yehia.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: India: BPB Publications, 2022Availability: Items available for loan: Main (1)Call number: QA76.9.A25 E44x 2022.
32. Books
Information security and cyber laws

by Mishra, Amit Kumar.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi: S.K. Kataria & Sons, 2024Availability: Items available for loan: Main (1)Call number: QA76.9 .A25 M57x 2024.
33. Books
Cryptography and network security

by Chaudhary, Vikas | Garg, Kanika.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi: S.K. Kataria & Sons, 2024Availability: Items available for loan: Main (1)Call number: TK5105.59 .C43x 2024.
34. Books
Hacking: be a hacker with ethics

by Bohra, Harsh.

Edition: Rev ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi: KHANNA Book, 2018Availability: Items available for loan: Main (1)Call number: QA76.9.A25 B68x 2018.
35. Books
Modern cybersecurity practices: exploring and implementing agile cybersecurity frame and strategies for your organization

by Ackerman, Pascal.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: India: BPB, 2020Availability: Items available for loan: Main (1)Call number: HF5548.37 .A25 2020.
36. Books
Protect your windows network: from perimeter to data

by Johansson, Jesper M | Steve, Riley.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River: Pearson Education, 2005Availability: Items available for loan: Main (1)Call number: QA76.9.A25 J62 2005.
Pages
Bowen University Library is proudly powered by koha