Your search returned 19 results.

Sort
Results
1. Books
Risks controls and security: concepts and applications

by Raval, Vasant | Fichadia, Ashok.

Edition: 1st ed. Publication details: New Jersey: John Wiley & Sons Inc. 2007Availability: Items available for loan: Main (1)Call number: QA76.6 .A25 2007.
2. Books
Principles of information systems security text and cases

by Dhillon, Gurpreet.

Publication details: USA: John Wiley & Sons Ltd 2007Availability: Items available for loan: Main (1)Call number: QA76.9 .A25 D25 2006.
3. Books
protect yourself online

by Danda, Matthew.

Publication details: Washington Microsoft Press 2001Availability: Items available for loan: Main (1)Call number: TK5105.59 .D36 2001.
4. Books
Principles of information security.

by Whitman, Michael E | Mattord, Herbert J.

Edition: 2nd ed. Publication details: Australia: Thomson Course Technology, 2005Availability: Items available for loan: Main (1)Call number: TK5105.59 .W54 2005.
5. Books
Management of information security.

by Whitman, Michael E | Mattord, Herbert J.

Publication details: Australia: Thomson Course Technology, 2004Availability: Items available for loan: Main (1)Call number: TK5105.59 .W54 2004.
6. Books
Cryptography and network security principles and practice

by Stallings, William.

Edition: 5th ed. Publication details: South Asia: Pearson Education, Inc., 2011Availability: Items available for loan: Main (2)Call number: TK5105.59 .S713 2011, ...
7. Books
Hack no more: internet security, attacks and defense

by Ahmed, Aliyu Ahmed.

Publication details: Kaduna: Ahmadu Bello University Press Limited, 2010Availability: Items available for loan: Main (1)Call number: QA76.9.A25 A36x 2010.
8. Books
Computer forensics jumpstart

by Solomon, Michael G.

Edition: 2nd ed. Publication details: Indiana: Wiley Publishing, Inc., 2011Availability: Items available for loan: Main (1)Call number: QA76.9.A25 S6556 2011.
9. Books
Cryptography and network security

by Gupta, Prakash C.

Publication details: New Delhi: PHI Learning Private, 2015Availability: Items available for loan: Main (1)Call number: TK5105.59 .G86x 2015.
10. Books
Cryptography and network security

by Kahate, Atul.

Edition: 3rd ed. Publication details: New Delhi: McGraw-Hill Education, 2013Availability: Items available for loan: Main (1)Call number: TK5105.59 .K34x 2013.
11. Books
Network security essentials: applications and standards

by Stallings, William.

Edition: 6th ed. Publication details: Harlow, England: Pearson Education, 2017Availability: Items available for loan: Main (1)Call number: TK5105.59 .S725 2017.
12. Books
Cryptography and network security: principles and practice

by Stallings, William.

Publication details: Boston: Pearson Education 2017Availability: Items available for loan: Main (1)Call number: TK5105.59 .S713 2017.
13. Books
CompTIA security+ study guide: exam SY0-301

by Dulaney, Emmett.

Edition: 5th ed. Publication details: Indianapolis: Wiley Technology, 2011Availability: Items available for loan: Main (1)Call number: QA76.3 .D8228 2011.
14. Books
CompTIA® Security+™ study guide: SYO-401

by Dulaney, Emmett | Easttom, Chuck.

Edition: 6th ed. Publication details: Hoboken: John Wiley & Sons, 2014Availability: Items available for loan: Main (1)Call number: QA76.3 .D8229 2014.
15. Books
Secrets of a cyber security architect

by Schoenfield, Brook S. E.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boca Raton, FL: CRC Press, 2023Availability: Items available for loan: Main (1)Call number: TK5105.59 .S36x 2023.
16. Books
Cryptography and network security: demystifying the ideas of network security, cryptographic algorithms, wireless security, IP security, system security, and email security

by Trivedi, Bhushan.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: India; BPB, 2022Availability: Items available for loan: Main (1)Call number: TK5105.59 .T75x 2022.
17. Books
Information security and cyber laws

by Mishra, Amit Kumar.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi: S.K. Kataria & Sons, 2024Availability: Items available for loan: Main (1)Call number: QA76.9 .A25 M57x 2024.
18. Books
Cryptography and network security

by Chaudhary, Vikas | Garg, Kanika.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi: S.K. Kataria & Sons, 2024Availability: Items available for loan: Main (1)Call number: TK5105.59 .C43x 2024.
19. Books
Modern cybersecurity practices: exploring and implementing agile cybersecurity frame and strategies for your organization

by Ackerman, Pascal.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: India: BPB, 2020Availability: Items available for loan: Main (1)Call number: HF5548.37 .A25 2020.
Pages
Bowen University Library is proudly powered by koha