Your search returned 14 results.

Sort
Results
1.
Computer security: principles and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York ; Pearson Education Limited ; 2018
Availability: No items available.

2.
Developing guidelines for improving information security risk management practices in higher education education institutions; a case of selected universities in Tanzania Fatma Said Kombo by
Material type: Text Text
Publication details: Dar es salaam University of Dar es salaam 2021
Availability: Items available for reference: Directorate of Library Services (UDSM): Not for loan (1)Collection, call number: East Africana Collection THS EAF QA76.9A25T34K553. Dr. Wilbert Chagula Library: Not for loan (1)Collection, call number: East Africana Collection THS QA76.9A25 T34K553.

3.
Mission critical : internet security by
Material type: Text Text
Publication details: Rockland, Massachusetts : Syngress Publishing, 2001
Availability: Items available for loan: Directorate of Library Services (UDSM) (1)Collection, call number: Science and Engineering Collection TK5105.S9.

4.
Information warfare by
Material type: Text Text
Publication details: London : John Wiley & Sons, 2009
Availability: Items available for reference: Directorate of Library Services (UDSM): Not for loan (1)Collection, call number: Social Sciences Special Reserve Collection HD38.7.V4713.

5.
Security risk analysis and its impact to a company network : a case study of Tanzania Telecommunications Company Limited by
Material type: Text Text
Publication details: Dar es Salaam : University of Dar es Salaam, 2011
Availability: Items available for reference: Directorate of Library Services (UDSM): Not for loan (2)Collection, call number: East Africana Collection THS EAF Q176.9.A25B46, ...

6.
Protecting information : from classical error to quantum cryptography Susan Leopp by
Material type: Text Text
Publication details: Cambridge : Cambridge University Press, 2006
Availability: Items available for loan: UDSM Library (2)Collection, call number: Science and Engineering Collection QA76.889.L64 2006, ...

7.
Viruses revealed by
Material type: Text Text
Publication details: Osborne : McGraw-Hill, 2001
Availability: Items available for loan: Directorate of Library Services (UDSM) (1)Collection, call number: Science and Engineering Collection QA76.76.C68H37 2001.

8.
IM Instant messaging security by
Material type: Text Text
Publication details: Boston : Elsevier, 2005
Availability: Items available for loan: Directorate of Library Services (UDSM) (1)Collection, call number: Science and Engineering Collection TK5105.73.R58.

9.
Cyber fraud tactics, techniques, and procedures by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : CRC Press , 2009
Availability: Items available for loan: Directorate of Library Services (UDSM) (2)Collection, call number: Social Sciences Collection HV6773.H69, ...

10.
Computer security assurance using the common criteria by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Clifton Park ; Thomson Delmar Learning , 2005
Availability: Items available for loan: Directorate of Library Services (UDSM) (1)Collection, call number: Science and Engineering Collection QA76.9.A25M48 2004.

11.
Implementing email security and tokens : current standards, tools, and practices by
Material type: Text Text
Publication details: Indianapolis : Wiley Publishing Inc , 2008
Availability: Items available for loan: Directorate of Library Services (UDSM) (2)Collection, call number: Science and Engineering Collection QA76.9.A25T874 2008, ...

12.
Digital forensis for network, internet, and cloud computing: a forensic evidence guide for moving targets and data by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam : Elsevier, 2010
Availability: Items available for loan: Directorate of Library Services (UDSM) (2)Collection, call number: Social Sciences Collection HV8079.C65D54 2010, ...

13.
Red Hat Linux security and optimization / Mohammed J. Kabir. by
Material type: Text Text
Publication details: New York : Hungry Minds, c2002
Availability: Items available for loan: Directorate of Library Services (UDSM) (1)Collection, call number: Science and Engineering Collection QA76.76.O63.

14.
The web application hacker's handbook : finding and exploring security flaws by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis : John Wiley & Sons , 2011
Availability: Items available for loan: Directorate of Library Services (UDSM) (2)Collection, call number: Science and Engineering Collection TK5105.875.I57S85 2011, ...

Pages
Copyright © All rights reserved. University of Dar es Salaam, Directorate of Library Services
Powered by Koha. Installed, Configured, and Customized by the Library ICT Department