Midlands State University Library

Your search returned 43 results.

Not what you expected? Check for suggestions
Sort
Results
Strategies for enhancing security of University Websites : Case of HIT and Nust/by George Maendayi by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2018
Availability: Items available for loan: Main Library (1)Call number: TK5105.59 MAE.

An information system security governance framework for Polytechnics in Zimbabwe/ Sinikiwe Mudondo by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2019
Availability: Items available for loan: Main Library (1)Call number: QA76.9.A25 MUD.

A Model For Information Security Awareness in The Tourism Industry/ Laurel Sibanda by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2018
Availability: Items available for loan: Main Library (1)Call number: QA76.9 SIB.

A model for information security awareness in the Tourism Industry/ Laurel Sibanda by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2018
Availability: Items available for loan: Main Library (1)Call number: QA76.9 SIB.

Cyber security : an introduction for non-technical managers created by Jeremy S Green by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Surrey Gower 2015
Availability: Items available for loan: Harare Campus Library (3)Call number: HF5548.37 GRE, ...

SQL injection attacks and defense Justin Clarke. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham, MA Elsevier, 2012
Availability: Items available for loan: Main Library (1)Call number: QA76.9A25 SQL.

Security leader insights for information protection : lessons and strategies from leading security professionals edited by Bob Fahy by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Waltham, Massachusetts Elsevier, 2014
Availability: Items available for loan: Law Library (1)Call number: QA76.9.A25 SEC. Main Library (1)Call number: QA76.9.A25 SEC.

Advanced persistent threat : understanding the danger and how to protect your organization Eric Cole by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English Publisher: Waltham ; Syngress, an imprint of Elsevier, 2013
Availability: Items available for loan: Harare Campus Library (2)Call number: QA76.9.A25 COL, ...

Professional penetration testing : creating and learning in a hacking lab created by Thomas Wilhelm by
Edition: Second
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Waltham: Elsevier, c2013
Availability: Items available for loan: Main Library (2)Call number: TK5105.59 WIL, ...

Low tech hacking : street smarts for security professionals / created by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers and Sean Lowther by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Waltham, Mass. : Syngress, c2012
Availability: Items available for loan: Main Library (3)Call number: QA76.9.A25 LOW, ...

Malware forensics field guide for windows systems digital forensics field guides created by Cameron H. Malin, Eoghan Casey, James M Aquilina by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Amsterdam Elsevier 2012
Availability: Items available for loan: Main Library (1)Call number: QA76.76.C68 MAL.

Computer and information security handbook / edited by John R. Vacca
Edition: Third edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Morgan Kaufmann Publishers, [2017]
Availability: Items available for loan: Main Library (3)Call number: QA76.9.A25 COM, ...

Computer and information security handbook / edited by John R. Vacca. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Original language: English Publisher: Amsterdam : Morgan Kaufmann, an imprint of Elsevier, 2013Publisher: c2013
Availability: Items available for loan: Main Library (1)Call number: QA76.9.A25 COM.

Social media security : leveraging social networking while mitigating risk / Michael Cross. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Amsterdam, [Netherlands] : Syngress, 2013
Availability: Items available for loan: Main Library (3)Call number: HM42 CRO, ...

Eleventh hour CISSP : study guide / created by Eric Conrad, Seth Misenar and Joshua Feldman; edited by Simon Bryan. by
Edition: Third edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Elsevier, 2017Copyright date: ©2017
Availability: Items available for loan: Main Library (1)Call number: TK5105.59 CON.

Windows registry forensics : advanced digital forensic analysis of the Windows registry / created by Harlan Carvey. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Elsevier, 2016
Availability: Items available for loan: Main Library (1)Call number: HV8079 CAR.

Social engineering penetration testing : executing social engineering pen tests, assessments and defense / created by Gavin Watson, Andrew Mason and Richard Ackroyd. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Oxford: Elsevier, 2014Copyright date: ©2014
Availability: Items available for loan: Main Library (1)Call number: HM668 WAT.

Comptia cysa+ study guide : exam CS0-002 / created by Mike Chappel and David Seidl. by
Edition: Second Edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: John Wiley and Sons, 2020
Availability: Items available for loan: Main Library (1)Call number: QA76.3 CHA.

Comptia cysa+ practice tests : exam cs0-002 / created by Mike Chappel and David Seidl. by
Edition: Second Edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: John Wiley and Sons, 2020
Availability: Items available for loan: Main Library (1)Call number: QA76.3 CHA.

Cybersecurity ABCs : delivering awareness, behaviours and culture change / created by Jessica Barker, Adrian Davis, Bruce Hallas and Ciarán McMahon by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: BCS, The Chartered Institute for IT, 2021
Availability: Items available for loan: Harare Campus Library (1)Call number: QA76.9.A25 CYB. Main Library (1)Call number: QA76.9.A25 CYB.

Pages