Your search returned 15 results.

Sort
Results
1.
Cyber threat intelligence by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Stockholm ; Springer ; 2018
Availability: Items available for loan: (5)Collection, call number: QA76.9.A26C93 2018, ...

2.
Measuring and communicating security's value: A compendium of metrics for enterprise protection by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam ; Elsevier ; 2015
Availability: Items available for loan: (5)Collection, call number: HV8290.C26, ...

3.
Inside internet security : what hackers don't want you to know by
Material type: Text Text
Publication details: Harlow : Addison - Wesley, 2000
Availability: Items available for loan: Directorate of Library Services (UDSM) (1)Collection, call number: Science and Engineering Collection TK105.59.C78.

4.
Information systems security modeling in organization by
Material type: Text Text
Publication details: Dar es Salaam: University of Dar es Salaam, 2006
Availability: Items available for reference: Directorate of Library Services (UDSM): Not for loan (2)Collection, call number: East Africana Collection THS EAF T58.64.B46, ...

5.
Mission critical : internet security by
Material type: Text Text
Publication details: Rockland, Massachusetts : Syngress Publishing, 2001
Availability: Items available for loan: Directorate of Library Services (UDSM) (1)Collection, call number: Science and Engineering Collection TK5105.S9.

6.
Information warfare by
Material type: Text Text
Publication details: London : John Wiley & Sons, 2009
Availability: Items available for reference: Directorate of Library Services (UDSM): Not for loan (1)Collection, call number: Social Sciences Special Reserve Collection HD38.7.V4713.

7.
Cyber Warfare : Technique, tactic and tools for security practitioner by
Edition: 2nd ed.
Material type: Text Text
Publication details: New York : Syngress, 2014
Availability: Items available for loan: Directorate of Library Services (UDSM) (2)Collection, call number: Science and Engineering Collection U163.A64 2014, ...

8.
Security risk analysis and its impact to a company network : a case study of Tanzania Telecommunications Company Limited by
Material type: Text Text
Publication details: Dar es Salaam : University of Dar es Salaam, 2011
Availability: Items available for reference: Directorate of Library Services (UDSM): Not for loan (2)Collection, call number: East Africana Collection THS EAF Q176.9.A25B46, ...

9.
Cybersecurity: geopolitics, law, and policy. by
Material type: Text Text
Publication details: London: Routledge Taylor & Francis group, 2017
Availability: Items available for loan: Directorate of Library Services (UDSM) (2)Collection, call number: Law Collection LAW TK5105.59.G85, ...

10.
IM Instant messaging security by
Material type: Text Text
Publication details: Boston : Elsevier, 2005
Availability: Items available for loan: Directorate of Library Services (UDSM) (1)Collection, call number: Science and Engineering Collection TK5105.73.R58.

11.
Computer security assurance using the common criteria by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Clifton Park ; Thomson Delmar Learning , 2005
Availability: Items available for loan: Directorate of Library Services (UDSM) (1)Collection, call number: Science and Engineering Collection QA76.9.A25M48 2004.

12.
Security of e-systems and computer networks by
Material type: Text Text
Publication details: Cambridge: Cambridge University Press, 2007
Availability: Items available for loan: Directorate of Library Services (UDSM) (2)Collection, call number: Science and Engineering Collection TK5105.59.O23 2007, ...

13.
Implementing email security and tokens : current standards, tools, and practices by
Material type: Text Text
Publication details: Indianapolis : Wiley Publishing Inc , 2008
Availability: Items available for loan: Directorate of Library Services (UDSM) (2)Collection, call number: Science and Engineering Collection QA76.9.A25T874 2008, ...

14.
The web application hacker's handbook : finding and exploring security flaws by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis : John Wiley & Sons , 2011
Availability: Items available for loan: Directorate of Library Services (UDSM) (2)Collection, call number: Science and Engineering Collection TK5105.875.I57S85 2011, ...

15.
Case studies in library security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Westport : Libraries Unlimited , 2002
Availability: Items available for loan: Directorate of Library Services (UDSM) (4)Collection, call number: Science and Engineering Collection Z679.6.S518 2002 , ...

Pages
Copyright © All rights reserved. University of Dar es Salaam, Directorate of Library Services
Powered by Koha. Installed, Configured, and Customized by the Library ICT Department