Midlands State University Library

Your search returned 131 results.

Not what you expected? Check for suggestions
Sort
Results
Routing, flow, and capacity design in communication and computer networks / created by Michał Pióro and Deepankar Medhi. by Series: The Morgan Kaufmann series in networking
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Elsevier, 2004Copyright date: ©2004
Availability: Items available for loan: Harare Campus Library (2)Call number: TK5105.5 PIO, ...

Advanced persistent threat : understanding the danger and how to protect your organization Eric Cole by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English Publisher: Waltham ; Syngress, an imprint of Elsevier, 2013
Availability: Items available for loan: Harare Campus Library (2)Call number: QA76.9.A25 COL, ...

Professional penetration testing : creating and learning in a hacking lab created by Thomas Wilhelm by
Edition: Second
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Waltham: Elsevier, c2013
Availability: Items available for loan: Main Library (2)Call number: TK5105.59 WIL, ...

Multimedia over IP and wireless networks : compression, networking, and systems edited by Philip A Chou and Mihaela van der Schaar by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Amsterdam Elsevier/Academic Press 2007
Availability: Items available for loan: Main Library (1)Call number: TK5105.15 MUL.

Collaborative enterprise architecture : enriching EA with lean, agile, and enterprise 2.0 practices created by Stefan Bente, Uwe Bombosch and Shailendra Langade by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Amsterdam : Elsevier 2012
Availability: Items available for loan: Main Library (1)Call number: HD30.213 BEN.

Data and computer communications created by William Stallings by
Edition: Seventh
Material type: Text Text; Format: print ; Literary form: Not fiction
New-Delhi Prentice-Hall 2004
Availability: Items available for loan: Main Library (2)Call number: TK 5105 STA , ...

The illustrated network : how TCP/IP works in a modern network / created by Walter Goralski. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Cambridge, MA : Morgan Kaufmann Publishers, 2017
Availability: Items available for loan: Main Library (2)Call number: QA76.8 GOR, ...

Computer and information security handbook / edited by John R. Vacca
Edition: Third edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Morgan Kaufmann Publishers, [2017]
Availability: Items available for loan: Main Library (3)Call number: QA76.9.A25 COM, ...

Computer networks : a systems approach / created by Larry L. Peterson and Bruce S. Davie by Series: The Morgan Kaufmann Series in networking | The Morgan Kaufmann Series in networking
Edition: Fourth edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Amsterdam : Morgan Kaufmann Publishers, 2007Copyright date: ©2007
Availability: Items available for loan: Main Library (1)Call number: TK5105.5 PET.

Computer networks : a systems approach / created by Larry L. Peterson and Bruce S. Davie by Series: The Morgan Kaufmann Series in networking
Edition: Fifth edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Morgan Kaufmann Publishers, 2012Copyright date: 2012 Elsevier
Availability: Items available for loan: Main Library (6)Call number: TK5105.5 PET, ... Zvishavane Mining Sciences Library (4)Call number: TK5105.5 PET, ...

Computer and information security handbook / edited by John R. Vacca. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Original language: English Publisher: Amsterdam : Morgan Kaufmann, an imprint of Elsevier, 2013Publisher: c2013
Availability: Items available for loan: Main Library (1)Call number: QA76.9.A25 COM.

Understanding data communications / created by Gilbert Held. by
Edition: Seventh edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Pearso Education, 2002Copyright date: ©2002
Availability: Items available for loan: Main Library (1)Call number: TK5105 HEL.

Computer networks : a systems approach / created by Larry L. Peterson and Bruce S. Davie by Series: The Morgan Kaufmann Series in networking
Edition: Sixth Edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Morgan Kaufmann Publishers, 2022Copyright date: Elsevier 2022
Availability: Items available for loan: Main Library (6)Call number: TK5105.5 PET, ...

Eleventh hour CISSP : study guide / created by Eric Conrad, Seth Misenar and Joshua Feldman; edited by Simon Bryan. by
Edition: Third edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Elsevier, 2017Copyright date: ©2017
Availability: Items available for loan: Main Library (1)Call number: TK5105.59 CON.

Windows registry forensics : advanced digital forensic analysis of the Windows registry / created by Harlan Carvey. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Elsevier, 2016
Availability: Items available for loan: Main Library (1)Call number: HV8079 CAR.

ICT law book : a source book for information and communication technologies & cyber law in Tanzania & East African community / created by Adam J. Mambi. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Mkuki na Nyota, 2010
Other title:
  • Information and communication technologies law book
  • Source book for information and communication technologies & cyber law in Tanzania & East African community
Online resources:
Availability: Items available for loan: Law Library (1)Call number: K564.C6 MAM.

Social engineering penetration testing : executing social engineering pen tests, assessments and defense / created by Gavin Watson, Andrew Mason and Richard Ackroyd. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Oxford: Elsevier, 2014Copyright date: ©2014
Availability: Items available for loan: Main Library (1)Call number: HM668 WAT.

Theoretical and experimental methods for defending against DDoS attacks / created by Mohammad Reza Khalifeh Soltanian and Iraj Sadegh Amiri; edited by Matthew Neely. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Waltham: Elsevier; 2016Copyright date: ©2016
Availability: Items available for loan: Main Library (1)Call number: TK5109.59 REZ.

Cyber operations and the use of force in international law / created by Marco Roscini by
Material type: Text Text; Format: print ; Literary form: Not fiction
Oxford University Press, 2014
Availability: Items available for loan: Law Library (1)Call number: K564.C6 ROS.

Pages