Your search returned 32 results.

Sort
Results
1. Books
Risks controls and security: concepts and applications

by Raval, Vasant | Fichadia, Ashok.

Edition: 1st ed. Publication details: New Jersey: John Wiley & Sons Inc. 2007Availability: Items available for loan: Main (1)Call number: QA76.6 .A25 2007.
2. Books
Cisco security bible

by Sharma, Rajesh Kumar.

Publication details: New York Hungry Mind, Inc. 2002Availability: Items available for loan: Main (1)Call number: TK5105.59 .S52 2002.
3. Books
Principles of information systems security text and cases

by Dhillon, Gurpreet.

Publication details: USA: John Wiley & Sons Ltd 2007Availability: Items available for loan: Main (1)Call number: QA76.9 .A25 D25 2006.
4. Books
Harley Hahn's internet insecurity: why your privacy, security and safety are at risk and what you can do about it

by Hahn, Harley.

Publication details: New Jersey: Prentice Hall PTR 2002Availability: Items available for loan: Main (2)Call number: TK5105.59 . H33x 2002, ...
5. Books
Network security: the complete reference

by Bragg, Robert | Rhodes-Ousley, Mark Strassberg, Keith.

Publication details: New York: McGraw-Hill/Osborne 2004Availability: Items available for loan: Main (1)Call number: TK5105.59 .B72x 2004.
6. Books
protect yourself online

by Danda, Matthew.

Publication details: Washington Microsoft Press 2001Availability: Items available for loan: Main (1)Call number: TK5105.59 .D36 2001.
7. Books
Active defense : a comprehensive guide to network security

by Brenton, Chris | Cameron Hunt.

Publication details: San Francisco: Sybex, 1994Availability: Items available for loan: Main (1)Call number: TK5105.59 .B75 2001.
8. Books
Internet security protocols : protecting IP traffic

by Black, Uyless.

Publication details: New Delhi Pearson Education Ltd. Availability: Items available for loan: Main (1)Call number: TK5105.59 .B56 2000.
9. Books
Cryptography and network security: principles and practices

by Stallings, William.

Edition: 4th ed. Publication details: Upper Saddle River, N J: Pearson Prentice Hall, 2006Availability: Items available for loan: Main (2)Call number: TK5105.59 .S713 2006, ...
10. Books
Principles of information security.

by Whitman, Michael E | Mattord, Herbert J.

Edition: 2nd ed. Publication details: Australia: Thomson Course Technology, 2005Availability: Items available for loan: Main (1)Call number: TK5105.59 .W54 2005.
11. Books
Management of information security.

by Whitman, Michael E | Mattord, Herbert J.

Publication details: Australia: Thomson Course Technology, 2004Availability: Items available for loan: Main (1)Call number: TK5105.59 .W54 2004.
12. Books
Cryptography and network security

by Forouzan, Behrouz A.

Publication details: Boston: McGraw-Hill, 2008Availability: Items available for loan: Main (2)Call number: TK5105.59 .F67x 2008., ...
13. Books
Cryptography and network security principles and practice

by Stallings, William.

Edition: 5th ed. Publication details: South Asia: Pearson Education, Inc., 2011Availability: Items available for loan: Main (2)Call number: TK5105.59 .S713 2011, ...
14. Books
Mastering windows network forensics and investigation

by Anson, Steve et al.

Edition: 2nd ed. Publication details: USA.: John Wiley & Sons Inc, 2012Availability: Items available for loan: Main (1)Call number: HV8079.C65 A57 2012.
15. Books
SAP security and risk management

by Linkies, Mario | Karin, Horst.

Edition: 2nd ed. Publication details: Boston: Galileo Press, 2011Availability: Items available for loan: Main (1)Call number: TK5105.59 .L567 2010.
16. Books
Hack no more: internet security, attacks and defense

by Ahmed, Aliyu Ahmed.

Publication details: Kaduna: Ahmadu Bello University Press Limited, 2010Availability: Items available for loan: Main (1)Call number: QA76.9.A25 A36x 2010.
17. Books
Computer forensics jumpstart

by Solomon, Michael G.

Edition: 2nd ed. Publication details: Indiana: Wiley Publishing, Inc., 2011Availability: Items available for loan: Main (1)Call number: QA76.9.A25 S6556 2011.
18. Books
Cryptography and network security

by Gupta, Prakash C.

Publication details: New Delhi: PHI Learning Private, 2015Availability: Items available for loan: Main (1)Call number: TK5105.59 .G86x 2015.
19. Books
Cryptography and network security

by Kahate, Atul.

Edition: 3rd ed. Publication details: New Delhi: McGraw-Hill Education, 2013Availability: Items available for loan: Main (1)Call number: TK5105.59 .K34x 2013.
20. Books
Network security essentials: applications and standards

by Stallings, William.

Edition: 6th ed. Publication details: Harlow, England: Pearson Education, 2017Availability: Items available for loan: Main (1)Call number: TK5105.59 .S725 2017.
Pages
Bowen University Library is proudly powered by koha