Your search returned 34 results.

Sort
Results
21.
Principles of computer security lab manual Vincent Nestler by
Edition: Fourth edition.
Material type: Text Text; Format: print ; Literary form: Fiction
Publisher: New York : McGraw-Hill Education, [2015]
Other title:
  • Principles of computer security
Availability: Items available for loan: Botho University Botswana (2)Call number: 005.8 PRI, ... Botho University eSwatini (1)Call number: 005.8 PRI.

22.
Security in computing Charles P. Pfleeger, Shari Lawrence Pfleeger. by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Prentice Hall PTR, 2003
Availability: Items available for loan: Botho University Botswana (3)Call number: 005.8PFL, ... Botho University eSwatini (3)Call number: 005.8 PFL, ...

23.
The Basics of Hacking and Penetration Testing / Engebretson, Patrick. by
Edition: 1st edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Syngress, 2011
Online resources:
Availability: Items available for loan: Botho University Namibia (3)Call number: 005.8 ENG, ...

24.
The Basics of Hacking and Penetration Testing / Engebretson, Patrick. by
Edition: 1st edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Syngress, 2011
Online resources:
Availability: No items available.

25.
Disaster recovery / EC-Council Press. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Publication details: Clifton Park, N.Y. : Course Technology Cengage Learning, 2011
Availability: No items available.

26.
Disaster recovery / EC-Council Press. by
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Publication details: Clifton Park, N.Y. : Course Technology Cengage Learning, 2011
Availability: Items available for loan: Botho University Botswana (3)Call number: 658.4 DIS, ...

27.
Information security management handbook by
Edition: 6th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, Fla. Auerbach/Taylor & Francis 2007
Online resources:
Availability: Items available for loan: Botho University Lesotho (7)Call number: 005.8 TIP, ...

28.
Security in computing by Charles P. Pfleeger, Shari Lawrence Pfleeger. by
Edition: 4th ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Prentice Hall, 2006
Online resources:
Availability: Items available for loan: Botho University Lesotho (1)Call number: 005.8 PFL.

29.
Security in computing . by
Edition: 4th ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. Prentice Hall 2006
Availability: Items available for loan: Botho University Lesotho (1)Call number: 005.8 PFL.

30.
Security in computing by Charles P. Pfleeger, Shari Lawrence Pfleeger. by
Edition: 4th ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Prentice Hall, 2006
Online resources:
Availability: Items available for loan: Botho University Lesotho (1)Call number: 005.8 PEL.

31.
Information technology law by
Edition: Fifth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Abingdon, Oxon ; New York, NY : Routledge, 2017
Availability: Items available for loan: Botho University eSwatini (1)Call number: 004.37 ROW.

32.
Information technology law by
Edition: 8. edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Oxford, United Kingdom New York, NY Oxford University Press [2017]
Availability: Items available for loan: Botho University eSwatini (1)Call number: 004.37 LLO.

33.
Practical Malware Analysis Sikorski, Michael. by
Edition: 1st edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: No Starch Press, 2012
Availability: Items available for loan: Botho University Lesotho (1)Call number: 005.84 SIK.

34.
Cloud Computing Security, 2nd Edition [electronic resource] / Vacca, John. by
Edition: 2nd edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: CRC Press, 2020
Availability: Items available for loan: Botho University Lesotho (2)Call number: TR 005.8 VAC, ...

Pages

Powered by Koha