Your search returned 36 results.

Sort
Results
1. Books
Risks controls and security: concepts and applications

by Raval, Vasant | Fichadia, Ashok.

Edition: 1st ed. Publication details: New Jersey: John Wiley & Sons Inc. 2007Availability: Items available for loan: Main (1)Call number: QA76.6 .A25 2007.
2. Books
Easy PC security and safety

by Penfold, R.A.

Series: (Baboni Computer Books) Publication details: London: Bernard Baboni Pub., 2004Availability: Items available for loan: Main (3)Call number: QA76.9 .A25 P46x 2004, ...
3. Books
Principles of information systems security text and cases

by Dhillon, Gurpreet.

Publication details: USA: John Wiley & Sons Ltd 2007Availability: Items available for loan: Main (1)Call number: QA76.9 .A25 D25 2006.
4. Books
Information technology: security & risk management

by Slay, Jill | Koronios, Andy.

Publication details: USA: John Wiley & Sons Ltd 2006Availability: Items available for loan: Main (1)Call number: QA76.9 .A25 S59x 2006.
5. Books
Fire walls: the complete reference

by Strassberg, Keith | Richard, Gondek Gary, Rollie.

Publication details: New York: McGraw-Hill/Osborne 2002Availability: Items available for loan: Main (1)Call number: QA76.9 .A25 S77x 2000.
6. Books
PC confidential: secure your PC and privacy from snoops, spies, spouses, supervisors, and credit card thieves

by Banks, Michael.

Publication details: London: SYBEX, 2000Availability: Items available for loan: Main (2)Call number: QA76.9 .A25 B36x 2000, ...
7. Books
protect yourself online

by Danda, Matthew.

Publication details: Washington Microsoft Press 2001Availability: Items available for loan: Main (1)Call number: TK5105.59 .D36 2001.
8. Books
Defending your digital assets against hackers, crackers, spies and thieves

by Nichols, Randall K | Ryan, Julie J.C.H; Daniel, J. Ryan.

Publication details: New York: McGraw-Hill, 2000Availability: Items available for loan: Main (1)Call number: QA76.9 .A25 N52 2000.
9. Books
Principles of information security.

by Whitman, Michael E | Mattord, Herbert J.

Edition: 2nd ed. Publication details: Australia: Thomson Course Technology, 2005Availability: Items available for loan: Main (1)Call number: TK5105.59 .W54 2005.
10. Books
Management of information security.

by Whitman, Michael E | Mattord, Herbert J.

Publication details: Australia: Thomson Course Technology, 2004Availability: Items available for loan: Main (1)Call number: TK5105.59 .W54 2004.
11. Books
Cryptography and network security principles and practice

by Stallings, William.

Edition: 5th ed. Publication details: South Asia: Pearson Education, Inc., 2011Availability: Items available for loan: Main (2)Call number: TK5105.59 .S713 2011, ...
12. Books
Hack no more: internet security, attacks and defense

by Ahmed, Aliyu Ahmed.

Publication details: Kaduna: Ahmadu Bello University Press Limited, 2010Availability: Items available for loan: Main (1)Call number: QA76.9.A25 A36x 2010.
13. Books
Computer forensics jumpstart

by Solomon, Michael G.

Edition: 2nd ed. Publication details: Indiana: Wiley Publishing, Inc., 2011Availability: Items available for loan: Main (1)Call number: QA76.9.A25 S6556 2011.
14. Books
Cryptography and network security

by Gupta, Prakash C.

Publication details: New Delhi: PHI Learning Private, 2015Availability: Items available for loan: Main (1)Call number: TK5105.59 .G86x 2015.
15. Books
Cryptography and network security

by Kahate, Atul.

Edition: 3rd ed. Publication details: New Delhi: McGraw-Hill Education, 2013Availability: Items available for loan: Main (1)Call number: TK5105.59 .K34x 2013.
16. Books
Network security essentials: applications and standards

by Stallings, William.

Edition: 6th ed. Publication details: Harlow, England: Pearson Education, 2017Availability: Items available for loan: Main (1)Call number: TK5105.59 .S725 2017.
17. Books
Cryptography and network security: principles and practice

by Stallings, William.

Publication details: Boston: Pearson Education 2017Availability: Items available for loan: Main (1)Call number: TK5105.59 .S713 2017.
18. Books
Breaking into information security: crafting a custom career path to get the job you really want

by More, Josh | Stieber, Anthony J | Liu, Chris | Friedman, Beth.

Publication details: Amsterdam: Elsevier, 2016Availability: Items available for loan: Main (1)Call number: QA76.9 .A25 M67x 2016.
19. Books
Essential information security

by Pitt, Cathy | Wieland, John.

Publication details: Van Haren, 2013Availability: Items available for loan: Main (1)Call number: QA76.9.A25 P58x 2013.
20. Books
Cybersecurity: engineering a secure information technology organization

by Shoemaker, Dan | Sigler, Kenneth.

Publication details: Andover: Cengage Learning, 2015Availability: Items available for loan: Main (1)Call number: QA76.9 .A25 S49 2015.
Pages
Bowen University Library is proudly powered by koha