Refine your search

Your search returned 143 results.

Sort
Results
101.
Windows forensic analysis DVD toolkit 2E / by
Edition: [2nd ed.].
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Burlington, Mass. : Syngress Pub., �2009
Availability: Items available for loan: Botho University Botswana (8)Call number: 005.8024363 CAR, ...

102.
Applied Cryptography : Protocols, Algorithms, and source code in C / by
Edition: 2nd ed.
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Publication details: New York : John Wiley & Sons, 1996
Availability: Items available for loan: Botho University Botswana (6)Call number: 005.82 SCH, ... Botho University eSwatini (2)Call number: 005.82 SCH, ...

103.
Practical malware analysis the hands-on guide to dissecting malicious software / by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: San Francisco : No Starch Press, 2012
Availability: Items available for loan: Botho University Botswana (7)Call number: 005.84 SIK, ... Botho University eSwatini (2)Call number: 005.84 SIK, ...

104.
Malware analyst's cookbook [electronic resource] : tools and techniques for fighting malicious code / Michael Hale Ligh ... [et al.]. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Indianapolis, Ind. : Wiley Pub., c2011
Availability: Items available for loan: Botho University Namibia (1)Call number: 005.8 MAL.

105.
Mastering Kali Linux for Advanced Penetration Testing by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Birmingham, England : Packt Publishing , 2014
Availability: Items available for loan: Botho University Botswana (2)Call number: 005.432 BEG, ...

106.
Applied Cryptography : Protocols, Algorithms, and source code in C / Bruce Schneier. by
Edition: 2nd ed.
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Publication details: New York : John Wiley & Sons, 1996
Availability: Items available for loan: Botho University Namibia (4)Call number: 005.82 SCH, ...

107.
The CISSP and CAP prep guide / by
Edition: Platium ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN: Wiley, c2007
Availability: Items available for loan: Botho University Botswana (5)Call number: 004.62 KRU, ...

108.
Lab manual for Guide to computer forensics and investigations by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Australia ; Boston, MA : Course Technology, Cengage Learning, 2011
Other title:
  • Guide to computer forensics and investigations
Availability: Items available for loan: Botho University Namibia (1)Call number: 005.8 BLI. Botho University eSwatini (5)Call number: 005.8 BLI, ...

109.
The hacker playbook : practical guide to penetration testing / by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: North Charleston, South Carolina : Secure Planet, LLC, 2014
Availability: Items available for loan: Botho University Botswana (2)Call number: 005.8 KIM, ... Botho University eSwatini (1)Call number: 005.8 KIM.

110.
CompTIA Security+ deluxe study guide : exam SY0-501 / Emmett Dulaney, Chuck Easttom. by
Edition: Fourth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, Indiana : Sybex : John Wiley & Sons, [2018]
Availability: Items available for loan: Botho University Lesotho (2)Call number: REF 005.8 DUL, ...

111.
Practical reverse engineering x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, Indiana Wiley 2014Copyright date: 2014
Availability: No items available.

112.
Practical reverse engineering x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, Indiana Wiley 2014Copyright date: 2014
Availability: No items available.

113.
Network security bible [ELECTRONIC BOOK] / by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley Pub., c2005
Availability: Items available for loan: Botho University Botswana (5)Call number: 005.8 COL, ...

114.
Cybercrime : the transformation of crime in the information age by Series:
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Cambridge ; Malden, MA : Polity Press, 2007Copyright date: 2007
Availability: Items available for loan: Botho University Botswana (1)Call number: 364.168 WAL.

115.
Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Burlington : Elsevier Science, 2011
Availability: Items available for loan: Botho University Botswana (1)Call number: 363.2562 CAR.

116.
Applied Cryptography : protocols, Algorithms, and source code in C / Bruce Schneier. by
Edition: 2nd ed.
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Publication details: New York : John Wiley & Sons, 1996
Availability: Items available for loan: Botho University Lesotho (2)Call number: 005.82 SCH S359, ...

117.
CEH Certified Ethical Hacker Practice Exams, Third Edition ; by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: McGraw-Hill/Osborne, 2017
Availability: Items available for loan: Botho University eSwatini (2)Call number: 005.8076 WAL, ...

118.
CompTIA security+ deluxe study guide : exam SY0-501 / Emmett Dulaney. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis : Sybex, 2017
Availability: Items available for loan: Botho University Lesotho (1)Call number: 005.8 DUL.

119.
Information security management handbook by
Edition: 6th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, Fla. Auerbach/Taylor & Francis 2007
Online resources:
Availability: Items available for loan: Botho University Lesotho (7)Call number: 005.8 TIP, ...

120.
Applied Cryptography : Protocols, Algorithms, and source code in C by
Edition: 2nd ed.
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Publication details: New York John Wiley & Sons 1996
Availability: Items available for loan: Botho University Lesotho (3)Call number: 005.8 SCH, ...

Pages

Powered by Koha