Books on the topic 'Computer networks – Security measures – Zimbabwe'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Computer networks – Security measures – Zimbabwe.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Oram, Andrew. Beautiful Security. O'Reilly, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

John, Mallery, ed. Hardening network security. McGraw-Hill/Osborne, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Teumim, David J. Industrial network security. 2nd ed. ISA, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Melissa, Zgola, and Bullaboy Dana, eds. Database security. Course Technology/Cengage Learning, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Horton, Mike. Network security portable reference. McGraw-Hill, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hunt, Craig. Network Security. O’Reilly Media, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

R, Panko Raymond, ed. Corporate computer security. 3rd ed. Prentice Hall, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Amine, Abdelmalek, Boualem Benatallah, and Otmane Ait Mohamed. Network security technologies: Design and applications. Information Science Reference, an imprint of IGI Global, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

J, Stang David. Network security. 6th ed. International Computer Security Association, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Jones and Bartlett Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Brown, Lawrie, and William Stallings. Computer Security. Pearson Education, Limited, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Merkow, Mark S., and Jim Breithaupt. Computer Security Assurance. Cengage Delmar Learning, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Computer security fundamentals. 2nd ed. Pearson IT Certification, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Rak, Jacek, Krzysztof Szczypiorski, Igor Kotenko, John Bay, Leonard Popyack, and Victor Skormin. Computer Network Security. Springer, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Kizza, Joseph Migga. Computer Network Security. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kizza, Joseph Migga. Computer Network Security. Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Douligeris, Christos, and Dimitrios N. Serpanos. Network Security. Wiley & Sons, Incorporated, John, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Malamud, Carl. Security and Networks. O'Reilly, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Zero Trust Networks. O'Reilly Media, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Kadrich, Mark. Endpoint Security. Pearson Education, Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Kadrich, Mark. Endpoint Security. Addison Wesley Professional, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Pike, James. Cisco Network Security. Prentice Hall PTR, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Strebe, Matthew. Network Security Jumpstart. Wiley & Sons, Incorporated, John, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Albanese, Jason, and Wes Sonnenreich. Network Security Illustrated. McGraw-Hill Professional, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Strebe, Matthew. Network Security JumpStart. Sybex, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Viega, John, and Andrew Oram. Beautiful Security: Leading Security Experts Explain How They Think. O'Reilly Media, Incorporated, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Viega, John, and Andrew Oram. Beautiful Security: Leading Security Experts Explain How They Think. O'Reilly Media, Incorporated, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Network Security Architectures. Cisco Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Network security architectures. Cisco Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Security Management. Prentice Hall, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Convery, Sean. Network Security Architectures. Pearson Education, Limited, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Teumim, David J. Industrial Network Security. ISA-The Instrumentation, Systems, and Automation Society, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Convery, Sean. Network Security Architectures. Cisco Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Smith, Richard E. Elementary Information Security. Jones & Bartlett Learning, LLC, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Stajano, Frank. Security for Ubiquitous Computing. Wiley & Sons Australia, Limited, John, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Rajesh, K. S. Cisco Security Bible. Wiley & Sons, Incorporated, John, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Brown, Lawrie, and William Stallings. Computer Security: Principles and Practices. Pearson Education, Limited, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Brown, Lawrie, and William Stallings. Computer Security: Principles and Practice. Prentice Hall, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Brown, Lawrie, and William Stallings. Computer Security: Principles and Practice. Pearson Education, Limited, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Brown, Lawrie, and William Stallings. Computer Security: Principles and Practice. Prentice Hall, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Kizza, Joseph Migga. Guide to Computer Network Security. Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Kizza, Joseph Migga. Guide to Computer Network Security. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Kizza, Joseph Migga. Guide to Computer Network Security. Springer, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Kizza, Joseph Migga. Guide to Computer Network Security. Springer International Publishing AG, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Easttom, William (Chuck) II. Computer Security Fundamentals. Pearson Education, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Easttom, Chuck. Computer Security Fundamentals. Pearson Education, Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Easttom, Chuck. Computer Security Fundamentals. Pearson Education, Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

II, William (Chuck) Easttom. Computer Security Fundamentals. Pearson Education, Limited, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

II, Easttom William (Chuck). Computer Security Fundamentals. Pearson Education, Limited, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Lockhart, Andrew. Network Security Hacks. O'Reilly Media, Incorporated, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!