Midlands State University Library

Your search returned 62 results.

Not what you expected? Check for suggestions
Sort
Results
The process of network security : designing and managing a safe network. by
Material type: Text Text
Publication details: Reading : Addison Wesley, 2000
Availability: Items available for loan: Zvishavane Library (1)Call number: TK 5105.59 WAD .

Essential PHP security Chris Shiflett by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Sebastopol O'Reilly Media 2006
Availability: Items available for loan: Main Library (2)Call number: QA76.73.P22 SHI, ... Zvishavane Library (1)Call number: QA76.73.P22 SHI.

Network and system security Edited by John R. Vacca by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Oxford Syngress 2010
Availability: Items available for loan: Main Library (1)Call number: TK5105.59 NET.

Inside network perimeter security : the definitive guide to firewalls, VPNs, routers, and intrusion detection systems by Stephen Northcutt...[et al.] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston New Riders 2003
Availability: Items available for loan: Main Library (1)Call number: TK5105.59 INS.

Practical embedded security : building secure resource-constrained systems Timothy Stapko by Series: (Embedded technology)
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington, MA Elsevier 2008
Availability: Items available for loan: Main Library (2)Call number: TK7895.E42 STA, ...

Network Security a desicion and game-theoretic approach Tansu Alpcan by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York Cambridge Uiversity Press 2011
Availability: Items available for loan: Main Library (1)Call number: TK5105.59 ALP.

Total information risk management : maximizing the value of data and information assets by Alexander Borek...[et al]. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham Elsevier 2014
Availability: Items available for loan: Main Library (1)Call number: HF54.5 TOT.

Information security management principles / created by David Alexander and edited by Andy Taylor, Amanda Finch and David Sutton. by
Edition: Second edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: BCS Learning Development, 2013Copyright date: ©2013
Availability: Items available for reference: Main Library Archives: Not for loan (1)Call number: QA76.9 ALE.

Digital rights management Joan Van Tassel protecting and monetizing content by Series: (NAB Executive technology briefings series)
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Oxford Elsevier 2006
Availability: Items available for loan: Law Library (1)Call number: QA76.9.A25 VAN.

Hospitality security: managing security in today's hotel, lodging, entertainment and tourism environment Darrell Clifton by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton CRC Press 2012
Availability: Items available for loan: Batanai Library (2)Call number: TX911.3.S4 CLI, ...

Crime in the library : a study of patterns, impact, and security Alan Jay Lincoln. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Bowker, 1984
Availability: Items available for loan: School of Social Work Library (1)Call number: Z679.6 LIN.

An analysis into financial data security in the cloud/by Nobuhle Annette Zinyengere by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: MSU, 2017
Availability: Items available for loan: Main Library (1)Call number: QA76.9 ZIN.

An e-safety framework for secondary schools in Zimbabwe/by Abel Moyo. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: GWERU: MSU 2017
Availability: Items available for loan: Main Library (1)Call number: HQ784.I58MOY.

Mitigating information security risks through effective IT operations in Zimbabwe City Councils: a case of Masvingo City Council/ Mercy Nyasha Magoso by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru Midlands State University 2018
Availability: Items available for loan: Main Library (1)Call number: QA76.9.A25 MAG.

Cybercrime Risks and Responses ; Eastern and Western Perspectives / edited by Russell G. Smith, Ray Chak-Chung Cheung and Laurie Yiu-Chung Lau. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hampshire Palgrave Macmillan 2015
Availability: Items available for loan: Main Library (1)Call number: HV6773 CYB.

SAP security configuration and deployment : the IT administrator's guide to best practices Leslie Wun-Young ... [et al.] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington Syngress 2009
Availability: Items available for loan: Main Library (1)Call number: HF5548.37 SAP.

Theoretical framework for combating commonly reported cyber-attacks on Zimbabwean click and mortar companies using artificially intelligent agent systems/by Rufaro Richard Tyoka by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2017
Availability: Items available for loan: Main Library (1)Call number: QA76.9.D343TYO.

An evaluation of information systems security in Zimbabwe local banks/by George Chinomona by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2017
Availability: Items available for loan: Main Library (1)Call number: HF5548.37 CHI.

An investigation of Cyber security issues threatening the cyberspace for Zimbabwe organizations/by Tatenda Ernest Murungweni by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2017
Availability: Items available for loan: Main Library (1)Call number: QA76.9.A25 MUR.

Infrastracture Surveillance System for Dandemutande Invesstments/by Kudakwashe Joe Manga by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2018
Availability: Items available for loan: Main Library (1)Call number: QA76.9.A25 MAN.

Pages