Books on the topic 'Computer networks – Security measures – Zimbabwe'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computer networks – Security measures – Zimbabwe.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Melissa, Zgola, and Bullaboy Dana, eds. Database security. Course Technology/Cengage Learning, 2012.
Find full textAmine, Abdelmalek, Boualem Benatallah, and Otmane Ait Mohamed. Network security technologies: Design and applications. Information Science Reference, an imprint of IGI Global, 2014.
Find full textJ, Stang David. Network security. 6th ed. International Computer Security Association, 1992.
Find full textVacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Jones and Bartlett Publishers, 2010.
Find full textBrown, Lawrie, and William Stallings. Computer Security. Pearson Education, Limited, 2018.
Find full textMerkow, Mark S., and Jim Breithaupt. Computer Security Assurance. Cengage Delmar Learning, 2004.
Find full textRak, Jacek, Krzysztof Szczypiorski, Igor Kotenko, John Bay, Leonard Popyack, and Victor Skormin. Computer Network Security. Springer, 2017.
Find full textDouligeris, Christos, and Dimitrios N. Serpanos. Network Security. Wiley & Sons, Incorporated, John, 2007.
Find full textStrebe, Matthew. Network Security Jumpstart. Wiley & Sons, Incorporated, John, 2006.
Find full textAlbanese, Jason, and Wes Sonnenreich. Network Security Illustrated. McGraw-Hill Professional, 2003.
Find full textViega, John, and Andrew Oram. Beautiful Security: Leading Security Experts Explain How They Think. O'Reilly Media, Incorporated, 2009.
Find full textViega, John, and Andrew Oram. Beautiful Security: Leading Security Experts Explain How They Think. O'Reilly Media, Incorporated, 2009.
Find full textTeumim, David J. Industrial Network Security. ISA-The Instrumentation, Systems, and Automation Society, 2004.
Find full textSmith, Richard E. Elementary Information Security. Jones & Bartlett Learning, LLC, 2011.
Find full textStajano, Frank. Security for Ubiquitous Computing. Wiley & Sons Australia, Limited, John, 2002.
Find full textBrown, Lawrie, and William Stallings. Computer Security: Principles and Practices. Pearson Education, Limited, 2012.
Find full textBrown, Lawrie, and William Stallings. Computer Security: Principles and Practice. Prentice Hall, 2007.
Find full textBrown, Lawrie, and William Stallings. Computer Security: Principles and Practice. Pearson Education, Limited, 2012.
Find full textBrown, Lawrie, and William Stallings. Computer Security: Principles and Practice. Prentice Hall, 2007.
Find full textKizza, Joseph Migga. Guide to Computer Network Security. Springer International Publishing AG, 2020.
Find full textEasttom, William (Chuck) II. Computer Security Fundamentals. Pearson Education, Limited, 2013.
Find full textII, William (Chuck) Easttom. Computer Security Fundamentals. Pearson Education, Limited, 2019.
Find full textII, Easttom William (Chuck). Computer Security Fundamentals. Pearson Education, Limited, 2018.
Find full text