Your search returned 10 results.

Sort
Results
1.
Ethical and Social Issues in the Information Age / by Joseph Migga Kizza. by Series: Texts in Computer Science
Edition: 6th ed. 2017.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Cham : Springer International Publishing : Imprint : Springer, 2017
Availability: Items available for loan: Botho University Ghana (1)Call number: 004 KIZ.
Lists:

2.
Ethical and Secure Computing A Concise Module / by Joseph Migga Kizza. by Series: Undergraduate topics in computer science
Edition: Third edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Cham : Springer, 2023
Availability: Items available for loan: Botho University Ghana (1)Call number: 005.8 KIZ.

3.
Cryptography : the key to digital security, how it works, and why it matters / Keith Martin. by
Edition: First edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York, NY : W. W. Norton & Company, Inc., [2020]
Availability: Items available for loan: Botho University Botswana (1)Call number: 005.28 MAR.

4.
Guide to Wireless Network Security by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Boston, MA : Springer US, 2006
Availability: Items available for loan: Botho University Botswana (4)Call number: 621.3821 VAC, ...

5.
Cryptography and network security : principles and practices / by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Pearson/Prentice Hall, 2006
Availability: Items available for loan: Botho University Botswana (3)Call number: 005.8 STA, ... Botho University eSwatini (4)Call number: 005.8 STA, ...

6.
Forensic computing [a practitioner's guide] Tony Sammes and Brian Jenkinson. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: London Springer 2007
Availability: Items available for loan: Botho University Namibia (3)Call number: 363.25 SAM, ...

7.
Data Hiding Techniques in Windows OS : A Practical Approach to Investigation and Defense by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Elsevier Science and Technology Books, Inc., 2017
Availability: Items available for loan: Botho University Botswana (2)Call number: 005.82 HAS, ... Botho University eSwatini (1)Call number: 005.82 HAS.

8.
Cryptography and secure communication / by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Cambridge : Cambridge University Press, 2014
Availability: Items available for loan: Botho University Botswana (1)Call number: 005.82 BLA.

9.
Java cryptography by Series:
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Sebastopol, Calif. : O'Reilly, 1998
Availability: Items available for loan: Botho University Botswana (3)Call number: 005.82 KNU, ... Botho University eSwatini (1)Call number: 005.82 KNU.

10.
Multimedia data hiding by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York ; London : Springer, 2011
Availability: Items available for loan: Botho University eSwatini (1)Call number: 006.7 WU.

Pages

Powered by Koha