Midlands State University Library

Your search returned 62 results.

Not what you expected? Check for suggestions
Sort
Results
The securitization and policing of art theft : the case of London / created by John Kerr. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Ashgate, 2015Copyright date: ©2015
Availability: Items available for loan: Law Library (3)Call number: N8795.3.G7 KER, ...

Computer and information security handbook / edited by John R. Vacca
Edition: Third edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Morgan Kaufmann Publishers, [2017]
Availability: Items available for loan: Main Library (3)Call number: QA76.9.A25 COM, ...

Risk analysis and the security survey / created by James F. Broder, Eugene Tucker. by
Edition: 4th Ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam ; Waltham, MA : Butterworth-Heinemann, 2012
Availability: Items available for loan: Main Library (2)Call number: HV8290 BRO, ...

Computer and information security handbook / edited by John R. Vacca. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Original language: English Publisher: Amsterdam : Morgan Kaufmann, an imprint of Elsevier, 2013Publisher: c2013
Availability: Items available for loan: Main Library (1)Call number: QA76.9.A25 COM.

Android forensics : investigation, analysis, and mobile security for Google Android / created by Andrew Hoog. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Syngress, 2011Copyright date: ©2011
Availability: Items available for loan: Harare Campus Library (1)Call number: TK5105.885.G66 HOO.

Social media security : leveraging social networking while mitigating risk / Michael Cross. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Amsterdam, [Netherlands] : Syngress, 2013
Availability: Items available for loan: Main Library (3)Call number: HM42 CRO, ...

Contemporary security management / created by John J. Fay. by
Edition: Third edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington, MA : Butterworth-Heinemann, ©2011
Availability: Items available for loan: Main Library (1)Call number: HV8290 FAY.

Eleventh hour CISSP : study guide / created by Eric Conrad, Seth Misenar and Joshua Feldman; edited by Simon Bryan. by
Edition: Third edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Elsevier, 2017Copyright date: ©2017
Availability: Items available for loan: Main Library (1)Call number: TK5105.59 CON.

Windows registry forensics : advanced digital forensic analysis of the Windows registry / created by Harlan Carvey. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Elsevier, 2016
Availability: Items available for loan: Main Library (1)Call number: HV8079 CAR.

The executive protection professional's manual / created by Philip Holder and Donna Lea Hawley. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Butterworth-Heinemann, 1998Copyright date: ©1998
Availability: Items available for loan: Main Library (1)Call number: HV8290 HOL.

Social engineering penetration testing : executing social engineering pen tests, assessments and defense / created by Gavin Watson, Andrew Mason and Richard Ackroyd. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Oxford: Elsevier, 2014Copyright date: ©2014
Availability: Items available for loan: Main Library (1)Call number: HM668 WAT.

Theoretical and experimental methods for defending against DDoS attacks / created by Mohammad Reza Khalifeh Soltanian and Iraj Sadegh Amiri; edited by Matthew Neely. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Waltham: Elsevier; 2016Copyright date: ©2016
Availability: Items available for loan: Main Library (1)Call number: TK5109.59 REZ.

Frameworks for ICT policy : government, social and legal issues / edited by Esharenana E. Adomi. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Information Science Reference, 2011
Availability: Items available for loan: Law Library (1)Call number: HC59.72.155 ADO.

Certified cloud security professional : official study guide / created by Ben Malisow. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: John Wiley and Sons, 2020Copyright date: ©2020
Availability: Items available for loan: Batanai Library (1)Call number: QA76.585 MAL. Harare Campus Library (1)Call number: QA76.585 MAL. Main Library (7)Call number: QA76.585 MAL, ... Zvishavane Library (1)Call number: QA76.585 MAL.

Comptia cysa+ practice tests : exam cs0-002 / created by Mike Chappel and David Seidl. by
Edition: Second Edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: John Wiley and Sons, 2020
Availability: Items available for loan: Main Library (1)Call number: QA76.3 CHA.

Cybersecurity ABCs : delivering awareness, behaviours and culture change / created by Jessica Barker, Adrian Davis, Bruce Hallas and Ciarán McMahon by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: BCS, The Chartered Institute for IT, 2021
Availability: Items available for loan: Harare Campus Library (1)Call number: QA76.9.A25 CYB. Main Library (1)Call number: QA76.9.A25 CYB.

Practical aviation security : predicting and preventing future threats / created by Jeffrey C. Price and Jeffrey S. Forrest. by
Edition: Third edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Elsevier, 2016
Availability: Items available for loan: Main Library (1)Call number: TL725.3 S44 PRI.

ASP.Net core security / created by Christan Wenz. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Manning Publications Co., 2022
Availability: Items available for loan: Batanai Library (1)Call number: TK5105.59 WEN. Harare Campus Library (1)Call number: TK5105.59 WEN. Main Library (1)Call number: TK5105.59 WEN. Zvishavane Mining Sciences Library (1)Call number: TK5105.59 WEN.

Comptia security+ tudy guide : exam sy0-601 / created by Mike Chapple and David Seidl. by
Edition: Eighth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, 2021
Availability: Items available for loan: Main Library (1)Call number: QA76.9.A25 CHA.

Comptia® Security+® Practice Tests : exam sy0-601 / created by David Seidl. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: John Wiley and Sons, 2020
Availability: Items available for loan: Main Library (2)Call number: QA76.9.A25 SEI, ...

Pages