Your search returned 5 results.

Sort
Results
Electronic theft: unlawful acquisition in cyberspace

by Grabosky, Peter | Dempsey, Gillian.

Publication details: Cambridge: CUP 2001Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: HV 6773 Gra.

Handbook of computer crime investigation: forensic tools and technology edited by Eoghan Casey

by Casey, Eoghan.

Publication details: London: Elsevier Academic Press 2002Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: HV 8079.C65 Han.

Cyber crime: issues threats and management. 2 vols. edited by Atul Jain

by Jain, Atul.

Publication details: Delhi: Isha Books 2005Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (2) . Collection(s): Call number: HV 6773 Cyb.

Foundations of computer security by David Salmon

by Salomon, David.

Publication details: London: Springer 2006Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: QA 76.9.A25 Sal.

DNS security : defending the domain name system / by Allan Lister and Geoffrey Stowe

by Liska, Allan | Stowe, Geoffrey.

Language: English Publication details: Cambridge : Elsevier, 2016Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): CBU-Lusaka Campus Call number: QA 76.9.A25 Lis.

Pages
Not finding what you're looking for?