Computer security fundamentals / Chuck Easttom.
Material type:
- 9780137984787
- 078975746X
- 005.8 23
- QA76.9.A25 E27 2023
Item type | Current library | Collection | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Zetech Library - Mang'u Campus General Stacks | Non-fiction | QA76.9.A25 .E27 2023 (Browse shelf(Opens below)) | C1 | Available | Z011474 | |
![]() |
Zetech Library - Ruiru Campus General Stacks | Non-fiction | QA76.9.A25 .E27 2023 (Browse shelf(Opens below)) | C2 | Available | Z011475 |
Browsing Zetech Library - Mang'u Campus shelves, Shelving location: General Stacks, Collection: Non-fiction Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
No cover image available No cover image available |
![]() |
![]() |
||
QA76.774.A53 .H67 2021 Android programming for beginners: Build in-depth, full-featured android apps starting from zero programming experience / | QA76.8.I292 .T75 2014 The 8088 and 8086 microprocessors programming ,interfacing , hardware / | QA76.9.A25 .B47 2022 Cryptography algorithms: A guide to algorithms in blockchain quantum cryptography zero knowledge protocols and homorphic encryption / | QA76.9.A25 .E27 2023 Computer security fundamentals / | QA76.9.A43 .A76 2022 Analysis and design of algorithms / | QA76.9.A43 .L37 2021 Advanced Algorithms and data structures/ | QA76.9.A43 .L37 2021 Advanced Algorithms and data structures/ |
Includes index.
Introduction to Computer Security -- Networks and the Internet -- Cyber Stalking, Fraud and Abuse -- Denial of Service Attacks -- Malware -- Techniques used by Hackers -- Industrial Espionage in Cyberspace -- Encryption -- Computer Security Software -- Security Policies -- Network Scanning and Vulnerability Scanning -- Cyber Terrorism and Information Warfare -- Cyber Detective -- Introduction to Forensics
There are no comments on this title.