Your search returned 15 results.

Sort
Results
1.
Cloud computing security : foundations and challenges / edited by John R. Vacca. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boca Raton, FL : CRC Press, 2021Copyright date: �2021
Availability: Items available for loan: Botho University Lesotho (3)Call number: 005.8 CLO, ... Items available for reference: Botho University Lesotho: Not for loan (1)Call number: 005.8 CLO.

2.
The wires of war : technology and the global struggle for power / Jacob Helberg. by
Edition: First Avid Reader Press trade paperback edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York, NY : Avid Reader Press, an imprint of Simon & Schuster, Inc., 2022Copyright date: 2021
Availability: Items available for loan: Botho University Ghana (1)Call number: 327.028558 HEL.
Lists:

3.
CompTIA Network+ N10-005 in Depth. by
Edition: 2nd ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Boston : Independence : Course Technology CENGAGE Learning [distributor] Sept. 2013
Availability: Items available for loan: Botho University Botswana (1)Call number: 004.6.

4.
Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation / Bruce Dang, Alexandre Gazet, Elias Bachaalany with contributions from S�ebastien Josse. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, Indiana : Wiley, [2014]Copyright date: �2014
Availability: Items available for loan: Botho University Botswana (4)Call number: 005.36 DAN, ...

5.
A practical guide to computer forensics investigations [electronic resource] /
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Indianapolis, Indiana Pearson, [2015]
Availability: Items available for loan: Botho University Botswana (6)Call number: 364.168 HAY, ... Botho University eSwatini (2)Call number: 364.168 HAY, ...

6.
Windows registry forensics : advanced digital forensic analysis of the Windows registry / by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington, Mass. : Syngress, 2011
Availability: No items available.

7.
Windows registry forensics : advanced digital forensic analysis of the Windows registry / by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington, Mass. : Syngress, 2011
Availability: Items available for loan: Botho University Botswana (4)Call number: 363.2562 CAR, ...

8.
Information security management handbook / Harold F. Tipton, Micki Krause, [editors]. by
Edition: 6th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : Auerbach Publications, �2007-<c2014>
Availability: Items available for loan: Botho University Namibia (10)Call number: 005.8 TIP, ...

9.
Healthcare information security and privacy [Elektronski vir] / Sean P. Murphy. by Series: McGraw-Hill business classics
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: New York : McGraw-Hill Education, cop. 2015
Online resources:
Availability: Items available for loan: Botho University Namibia (1)Call number: 362.1068 MUR.

10.
The Basics of Hacking and Penetration Testing / Engebretson, Patrick. by
Edition: 1st edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Syngress, 2011
Online resources:
Availability: Items available for loan: Botho University Namibia (3)Call number: 005.8 ENG, ...

11.
The Basics of Hacking and Penetration Testing / Engebretson, Patrick. by
Edition: 1st edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Syngress, 2011
Online resources:
Availability: No items available.

12.
Hands-on ethical hacking and network defense [electronic resource] / Michael T. Simpson, Kent Backman, James E. Corley. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Boston, MA : Course Technology, 2012
Availability: Items available for loan: Botho University Namibia (2)Call number: 005.8 SIM, ...

13.
Malware analyst's cookbook [electronic resource] : tools and techniques for fighting malicious code / Michael Hale Ligh ... [et al.]. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Indianapolis, Ind. : Wiley Pub., c2011
Availability: Items available for loan: Botho University Namibia (1)Call number: 005.8 MAL.

14.
Applied Cryptography : Protocols, Algorithms, and source code in C / Bruce Schneier. by
Edition: 2nd ed.
Material type: Text Text; Format: print regular print ; Literary form: Not fiction
Publication details: New York : John Wiley & Sons, 1996
Availability: Items available for loan: Botho University Namibia (4)Call number: 005.82 SCH, ...

15.
CompTIA Security+ deluxe study guide : exam SY0-501 / Emmett Dulaney, Chuck Easttom. by
Edition: Fourth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, Indiana : Sybex : John Wiley & Sons, [2018]
Availability: Items available for loan: Botho University Lesotho (2)Call number: REF 005.8 DUL, ...

Pages

Powered by Koha