Your search returned 7 results.

Sort
Results
1. Books
Information technology: security & risk management

by Slay, Jill | Koronios, Andy.

Publication details: USA: John Wiley & Sons Ltd 2006Availability: Items available for loan: Main (1)Call number: QA76.9 .A25 S59x 2006.
2. Books
Breaking into information security: crafting a custom career path to get the job you really want

by More, Josh | Stieber, Anthony J | Liu, Chris | Friedman, Beth.

Publication details: Amsterdam: Elsevier, 2016Availability: Items available for loan: Main (1)Call number: QA76.9 .A25 M67x 2016.
3. Books
Essential information security

by Pitt, Cathy | Wieland, John.

Publication details: Van Haren, 2013Availability: Items available for loan: Main (1)Call number: QA76.9.A25 P58x 2013.
4. Books
Security in computing

by Pfleeger, Charles P.

Publication details: New Jersey: Prentice-Hall, 1989Availability: Items available for loan: Main (1)Call number: QA76.9 .A25 P45 1989.
5. Books
Protective security: creating military-grade defenses for your digital business

by Seaman Jim.

Publication details: U.K.: Apress, 2021Availability: Items available for loan: Main (1)Call number: QA76.9.A25 S42x 2021.
6. Books
Serverless security: understand, assess, and implement secure and reliable applications in AWS, Microsoft azure, and google cloud

by Calles, Miguel A.

Publication details: CA, U.S.A.: Apress, 2020Availability: Items available for loan: Main (1)Call number: TK5105.59 .C34x 2020.
7. Periodicals
International Journal of Information Security Privacy and Digital forensics

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Lagos Nigeria Computer Society 2021Availability: Items available for reference: Main: Not for loan (2)Call number: QA76.9 .A25 I556, ...
Pages
Bowen University Library is proudly powered by koha