Books on the topic 'Computer networks – Security measures – Zimbabwe'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computer networks – Security measures – Zimbabwe.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Computer security fundamentals. 2nd ed. Indianapolis, Ind: Pearson IT Certification, 2012.
Find full textPer, Christoffersson, ed. Security mechanisms for computer networks. Chichester, West Sussex, England: Ellis Horwood, 1989.
Find full textPractical computer network security. Boston: Artech House, 1995.
Find full textNetwork security architectures. Indianapolis, IN: Cisco Press, 2004.
Find full textFundamentals of network security. New York: McGraw-Hill Technology Education, 2004.
Find full textDonald, Stoddard, ed. Network security first-step. 2nd ed. Indianapolis, IN: Cisco Press, 2012.
Find full textNetworking security and standards. Boston, Mass: Kluwer Academic, 1997.
Find full textNetwork security first-step. Indianapolis, IN: Cisco Press, 2004.
Find full textNetwork security auditing. Indianapolis, Ind: Cisco Press, 2010.
Find full textMelissa, Zgola, and Bullaboy Dana, eds. Database security. Boston, Mass: Course Technology/Cengage Learning, 2012.
Find full textComputer security fundamentals. Upper Saddle River, N.J: Pearson Prentice Hall, 2006.
Find full textWilliam, Stallings. Computer security: Principles and practice. Upper Saddle River, N.J: Prentice Hall, 2008.
Find full textMark, Rhodes-Ousley, and Strassberg Keith, eds. Network security: The complete reference. New York: McGraw-Hill/Osborne, 2004.
Find full textHorton, Mike. Network security portable reference. New York: McGraw-Hill, 2003.
Find full textR, Panko Raymond, ed. Corporate computer security. 3rd ed. Boston: Prentice Hall, 2013.
Find full textFry, Chris. Security Monitoring. Beijing: O'Reilly, 2009.
Find full textOram, Andrew. Beautiful Security. Sebastopol, CA: O'Reilly, 2009.
Find full textR, Simon Alan, ed. Network security. Boston: AP Professional, 1994.
Find full textAnton, Chuvakin, ed. Security Warrior. Beijing: O'Reilly, 2004.
Find full textHunt, Craig. Network Security. Sebastopol, CA: O’Reilly Media, 1998.
Find full textL, Panko Julia, ed. Business data networks and security. 9th ed. Boston: Pearson, 2013.
Find full textHandbook of security and networks. Hackensack, NJ: World Scientific, 2011.
Find full textNetwork security firewalls & VPNs. Sudbury, MA: Jones & Bartlett Learning, 2010.
Find full textJ, Stang David. Network security. 6th ed. Washington, DC: International Computer Security Association, 1992.
Find full textChristmas, Paul. Network security manager. Oxford, England: Elsevier Advanced Technology, 1992.
Find full textNetwork security foundations. San Francisco, Calif: SYBEX, 2004.
Find full textBrown, Lawrie, and William Stallings. Computer Security. Pearson Education, Limited, 2018.
Find full textMerkow, Mark S., and Jim Breithaupt. Computer Security Assurance. Cengage Delmar Learning, 2004.
Find full textRak, Jacek, Krzysztof Szczypiorski, Igor Kotenko, John Bay, Leonard Popyack, and Victor Skormin. Computer Network Security. Springer, 2017.
Find full textKizza, Joseph Migga. Computer Network Security. Springer, 2010.
Find full textBeautiful Security. O'Reilly Media, Inc., 2008.
Find full textEndpoint Security. Addison-Wesley Professional, 2007.
Find full textNetwork Security Illustrated. McGraw-Hill Professional, 2003.
Find full textAlbanese, Jason, and Wes Sonnenreich. Network Security Illustrated. McGraw-Hill Professional, 2003.
Find full textNetwork Security Fundamentals. Cisco Press, 2004.
Find full textCisco Network Security. Prentice Hall PTR, 2001.
Find full textPike, James. Cisco Network Security. Prentice Hall PTR, 2001.
Find full textSecurity Management. Prentice Hall, 2007.
Find full textHossein, Bidgoli, ed. Handbook of information security. Hoboken, NJ: Wiley, 2005.
Find full textElementary Information Security. Jones & Bartlett Learning, LLC, 2015.
Find full textNetwork Security Architectures. Cisco Press, 2004.
Find full textElementary Information Security. Jones & Bartlett Learning, 2019.
Find full textElementary Information Security. Jones & Bartlett Publishers, 2011.
Find full textElementary Information Security. Class Publishing, 2019.
Find full textElementary Information Security. Jones & Bartlett Learning, LLC, 2016.
Find full textJ, Cooper Frederic, ed. Implementing Internet security. Indianapolis, Ind: New Riders Pub., 1995.
Find full textII, William (Chuck) Easttom. Computer Security Fundamentals. Pearson Education, Limited, 2019.
Find full textWilma, Caldwell, ed. Computer security sourcebook. Detroit, MI: Omnigraphics, 2003.
Find full textEasttom, William (Chuck) II. Computer Security Fundamentals. Pearson Education, Limited, 2013.
Find full textWilliam, Stallings. Computer Security: Principles and Practice. Pearson, 2017.
Find full text