Midlands State University Library

Your search returned 43 results.

Not what you expected? Check for suggestions
Sort
Results
Hack proofing proofing Linux : by
Material type: Text Text
Publication details: Rockland : Syngress, 2001
Availability: Items available for loan: Main Library (1)Call number: QA 76.76.O63 STA .

Firewalls and internet security : by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, 2003
Availability: Items available for loan: Main Library (1)Call number: TK 5105.875.157 CHE .

The web application hacker's handbook : by
Edition: ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis : Wiley Publishing,Inc., 2008
Availability: Items available for loan: Main Library (1)Call number: TK 5105.875.I57 STU .

Simple computer security : by
Edition: ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis : Wiley Publishing, 2007
Availability: Items available for loan: Main Library (2)Call number: QA76.9.A25 GEI , ... Zvishavane Library (1)Call number: QA 76.9.A25 GEI .

Computer security : lab manual Vincent J. Nestler...[et al.] by Series: (Information assurance & security series)
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston McGraw-Hill companies 2006
Availability: Items available for loan: Zvishavane Library (2)Call number: QA76.9.A25 COM, ... Items available for reference: Main Library: Not for loan (1)Call number: QA76.9 COM. Zvishavane Library: Not for loan (1)Call number: QA76.9 COM.

Guide to computer forensics and investigations Bill Nelson by
Edition: Fourth
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston Course Technology, Cengage learning 2010
Availability: Items available for loan: Main Library (6)Call number: HV8079.C65 NEL, ...

Practical embedded security : building secure resource-constrained systems Timothy Stapko by Series: (Embedded technology)
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington, MA Elsevier 2008
Availability: Items available for loan: Main Library (2)Call number: TK7895.E42 STA, ...

Information security management principles / created by David Alexander and edited by Andy Taylor, Amanda Finch and David Sutton. by
Edition: Second edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: BCS Learning Development, 2013Copyright date: ©2013
Availability: Items available for reference: Main Library Archives: Not for loan (1)Call number: QA76.9 ALE.

Computer security : by
Edition: ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: West Sussex : John Wiley and Sons, 1999
Availability: Items available for loan: Batanai Library (1)Call number: QA76.9 GOL .

Security in computing : by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Delhi : Pearson Education, 2004
Availability: Items available for loan: Batanai Library (1)Call number: QA76.9 PFL .

Security complete. / by
Edition: 2nd
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : BPB Publications, 2003
Availability: Items available for loan: Batanai Library (1)Call number: QA76.9.A25 SEC .

Securing PCs and data in libraries and schools : by
Edition: ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Neal-Schuman Publishers, Inc, 1997
Availability: Items available for loan: Batanai Library (1)Call number: QA76.9 BEN . Main Library (5)Call number: QA76.9 BEN , ... Zvishavane Library (2)Call number: QA76.9 BEN , ...

Mitigating information security risks through effective IT operations in Zimbabwe City Councils: a case of Masvingo City Council/ Mercy Nyasha Magoso by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru Midlands State University 2018
Availability: Items available for loan: Main Library (1)Call number: QA76.9.A25 MAG.

Theoretical framework for combating commonly reported cyber-attacks on Zimbabwean click and mortar companies using artificially intelligent agent systems/by Rufaro Richard Tyoka by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2017
Availability: Items available for loan: Main Library (1)Call number: QA76.9.D343TYO.

An evaluation of information systems security in Zimbabwe local banks/by George Chinomona by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2017
Availability: Items available for loan: Main Library (1)Call number: HF5548.37 CHI.

An investigation of Cyber security issues threatening the cyberspace for Zimbabwe organizations/by Tatenda Ernest Murungweni by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2017
Availability: Items available for loan: Main Library (1)Call number: QA76.9.A25 MUR.

Infrastracture Surveillance System for Dandemutande Invesstments/by Kudakwashe Joe Manga by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2018
Availability: Items available for loan: Main Library (1)Call number: QA76.9.A25 MAN.

A framework to promote Cyber Security culture in Zimbabwe's secondary schools education/by Trust Sigauke by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2018
Availability: Items available for loan: Main Library (1)Call number: QA76.9.A25 SIG.

Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 / created by Harlan Carvey. by
Edition: Fourth edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham : Syngress, 2014
Availability: Items available for loan: Harare Campus Library (2)Call number: HV8079 CAR, ... Main Library (5)Call number: HV8079.C65 CAR, ...

ZPC Automated Network logs and ICT support ticket tracking system/by Tinashe Mahlabvani by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Gweru: Midlands State University, 2018
Availability: Items available for loan: Main Library (1)Call number: QA76.9.A25 MAH.

Pages