Midlands State University Library

Your search returned 31 results.

Not what you expected? Check for suggestions
Sort
Results
The process of network security : designing and managing a safe network. by
Material type: Text Text
Publication details: Reading : Addison Wesley, 2000
Availability: Items available for loan: Zvishavane Library (1)Call number: TK 5105.59 WAD .

Network and system security Edited by John R. Vacca by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Oxford Syngress 2010
Availability: Items available for loan: Main Library (1)Call number: TK5105.59 NET.

Inside network perimeter security : the definitive guide to firewalls, VPNs, routers, and intrusion detection systems by Stephen Northcutt...[et al.] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston New Riders 2003
Availability: Items available for loan: Main Library (1)Call number: TK5105.59 INS.

Practical embedded security : building secure resource-constrained systems Timothy Stapko by Series: (Embedded technology)
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington, MA Elsevier 2008
Availability: Items available for loan: Main Library (2)Call number: TK7895.E42 STA, ...

Network Security a desicion and game-theoretic approach Tansu Alpcan by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York Cambridge Uiversity Press 2011
Availability: Items available for loan: Main Library (1)Call number: TK5105.59 ALP.

Information security management principles / created by David Alexander and edited by Andy Taylor, Amanda Finch and David Sutton. by
Edition: Second edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: BCS Learning Development, 2013Copyright date: ©2013
Availability: Items available for reference: Main Library Archives: Not for loan (1)Call number: QA76.9 ALE.

SAP security configuration and deployment : the IT administrator's guide to best practices Leslie Wun-Young ... [et al.] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington Syngress 2009
Availability: Items available for loan: Main Library (1)Call number: HF5548.37 SAP.

Theoretical framework for combating commonly reported cyber-attacks on Zimbabwean click and mortar companies using artificially intelligent agent systems/by Rufaro Richard Tyoka by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2017
Availability: Items available for loan: Main Library (1)Call number: QA76.9.D343TYO.

An evaluation of information systems security in Zimbabwe local banks/by George Chinomona by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2017
Availability: Items available for loan: Main Library (1)Call number: HF5548.37 CHI.

An investigation of Cyber security issues threatening the cyberspace for Zimbabwe organizations/by Tatenda Ernest Murungweni by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2017
Availability: Items available for loan: Main Library (1)Call number: QA76.9.A25 MUR.

A framework to promote Cyber Security culture in Zimbabwe's secondary schools education/by Trust Sigauke by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2018
Availability: Items available for loan: Main Library (1)Call number: QA76.9.A25 SIG.

Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 / created by Harlan Carvey. by
Edition: Fourth edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham : Syngress, 2014
Availability: Items available for loan: Harare Campus Library (2)Call number: HV8079 CAR, ... Main Library (6)Call number: HV8079.C65 CAR, ...

ZPC Automated Network logs and ICT support ticket tracking system/by Tinashe Mahlabvani by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2018
Availability: Items available for loan: Main Library (1)Call number: QA76.9.A25 MAH.

Strategies for enhancing security of University Websites : Case of HIT and Nust/by George Maendayi by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2018
Availability: Items available for loan: Main Library (1)Call number: TK5105.59 MAE.

The impact of Website atributes on Website traffic in the Tertiary Education sector in Zimbabwe/by Precious Mandava by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2015
Availability: Items available for loan: PostGraduate Studies Library (1)Call number: TK5105.59 MAN.

Implications of information security governance on organisation performance to Zimbabwe Internet service providers/ Sibongile Debra Munyanduki by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2019
Availability: Items available for loan: PostGraduate Studies Library (1)Call number: HF5548.37 MUN.

A framework for data loss prevention for Central African cables Limited (CAFCA) / Anointed Mafenya by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2019
Availability: Items available for loan: Main Library (1)Call number: QA76.9.A25 MAF.

Cyber security : an introduction for non-technical managers created by Jeremy S Green by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Surrey Gower 2015
Availability: Items available for loan: Harare Campus Library (3)Call number: HF5548.37 GRE, ...

SQL injection attacks and defense Justin Clarke. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham, MA Elsevier, 2012
Availability: Items available for loan: Main Library (1)Call number: QA76.9A25 SQL.

Advanced persistent threat : understanding the danger and how to protect your organization Eric Cole by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English Publisher: Waltham ; Syngress, an imprint of Elsevier, 2013
Availability: Items available for loan: Harare Campus Library (2)Call number: QA76.9.A25 COL, ...

Pages