Southville International School and Colleges
Your cart is empty.
  • Cart
  • Lists
    Public lists Eva Luna New books Lux_list list_1
    Your lists Log in to create your own lists
  • Log in to your account
  • Your cookies
  • Search history
Southville International School and Colleges
  • Advanced search
  • Recent comments
  • Most popular
  • Libraries

Log in to your account

Log in with GOOGLE


If you do not have an external account, but do have a local account, you can still log in:

  1. Home
  2. Advanced search
  3. Results of search for 'ccl=su:"Computer security."', page 4 of 4

Refine your search

  • Availability

    • Limit to records with available items
  • Authors

    • 3G E-learning
    • Baloch, Rafay
    • editor: John R. Vacc...
    • Gollmann, Dieter
    • Gupta, Ajay
    • Kostopoulos, George ...
    • Kurtz, George
    • Lee, Ji Soo
    • Mattord, Herbert J.
    • Ramachandran, Vivek
    • Schwartau, Winn
    • Stallings, William
    • Steinberg, Joseph
    • Steuart, Chris
    • Stiennon, Richard
    • Tomsho, Greg
    • Vacca, John R.
    • Whitman, Michael E.
    • Wilson, Robert S.
    • Show more
    • Show less
  • Holding libraries

    • College Library
    • Luxembourg Library
    • Project Gutenberg
    • South Mansfield College
    • Southville International School Affiliated with Foreign Universities Library
  • Item types

    • Books
    • Curriculum - Based eBooks
    • eBooks
    • PASS
    • Periodicals
  • Locations

    • Fiction Section
    • Filipiniana Section
    • General Circulation Section
    • Graduate Section
    • Portfolio Assessment of SISC Students Section
    • Reserve Section
    • Scholastic Reading Center Section
    • Southville Foreign University Section
    • Show more
    • Show less
  • Series

    • 24/7, science behind...
    • --For dummies
    • Knowledge series
    • Understanding blockc...
  • Topics

    • Artificial intellige...
    • BeagleBone (Computer...
    • Computer networks
    • Computer networks--s...
    • Computer security
    • Cryptography
    • cyber security
    • Cybersecurity
    • Data encryption (Com...
    • Data protection
    • Forensic sciences
    • Hackers
    • Information technolo...
    • Internet
    • Operating systems (C...
    • Penetration testing ...
    • Political Science
    • Show more
    • Show less
  • Titles

    • Microsoft Windows (C...

Your search returned 75 results.

Not what you expected? Check for suggestions
Sort
  • First
  • Previous
  • 1
  • 2
  • 3
  • 4
Unhighlight Highlight
Select all Clear all
Select titles to:
Public lists
list_1
New list
Results
61.
Image from Google Jackets
Cryptography : algorithms, protocols, and standards for computer security / Zoubir Z Mammeri. by
  • Mammeri, Zoubir [author.]
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, New Jersey : John Wiley & Sons, Inc., 2024
Availability: Items available for loan: College Library (1)Call number: QA 268 .M36 2024.
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
62.
Image from Google Jackets
Guide to computer forensics and investigations Bill Nelson and three others by
  • Phillips, Amelia
  • Steuart, Chris
  • Wilson, Robert S
Edition: Seventh edition
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: Mason, OH Cengage Learning, LLC 2025
Availability: Items available for loan: College Library (2)Call number: HV 8079.C65 .G85 2025, ...
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
63.
Image from Google Jackets
Ethical hacking and penetration testing guide / Rafay Baloch. by
  • Baloch, Rafay [author.]
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : CRC Press, 2015
Availability: Items available for loan: College Library (1)Call number: QA 76.9.A25B356 .B35 2015.
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
64.
Image from Google Jackets
Artificial intelligence and cybersecurity / Natalie Fisher. by
  • Fisher, Natalie [author.]
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: New York, NY : 3G E-Learning LLC, 2025
Availability: Items available for loan: College Library (1)Call number: QA 76.9.A25 .F57 2025.
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
65.
Image from Google Jackets
Web hacking arsenal : a practical guide to modern web pentesting / Rafay Baloch. by
  • Baloch, Rafay [author.]
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton FL : CRC Press, 2025
Availability: Items available for loan: College Library (1)Call number: QA 76.9.A25 .B35 2025.
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
66.
Image from Google Jackets
Cybersecurity and risk management / Lydia Bell. by
  • Bell, Lydia [author.]
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: New York, NY : 3G E-Learning LLC, 2025
Availability: Not available: College Library: Checked out (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
67.
Image from Google Jackets
Hacking multifactor authentication / Sanjay Singh. by
  • Singh, Sanjay [author.]
Edition: First edition.
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi, India : Venus Books, 2025
Availability: Items available for loan: College Library (1)Call number: QA 76.9.A25 .S56 2025.
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
68.
Image from Google Jackets
Data privacy and security techniques / Lydia Bennett. by
  • Bennett, Lydia [author.]
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: New York, NY : 3G E-Learning LLC, 2025
Availability: Items available for loan: College Library (1)Call number: QA 76.9.A25 .B46 2025.
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
69.
Image from Google Jackets
Foundations of information security : (an elementary text) / Miles Carr. by
  • Carr, Miles [author.]
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: New York, NY : Larsen and Keller Education, 2025
Availability: Items available for loan: College Library (1)Call number: TK 5105.59 .C37 2025.
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
70.
Image from Google Jackets
Principles of information security / Michael E. Whitman and Herbert J. Mattord. by
  • Whitman, Michael E [author.]
Edition: Seventh edition.
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA : Cengage, 2022
Availability: Items available for loan: College Library (1)Call number: QA 76.9.A25 .W45 2022.
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
71.
Image from Google Jackets
Cyber intelligence and threat analysis / Larry Collins. by
  • Collins, Larry [author.]
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: Jersey City, USA : Alexis Press, 2025
Availability: Items available for loan: College Library (1)Call number: QA 76.9.A25 .C65 2025.
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
72.
Image from Google Jackets
Cybersecurity and artificial intelligence / Dennis Simmons. by
  • Simmons, Dennis [author.]
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: Jersey City, USA : Alexis Press, 2025
Availability: Items available for loan: College Library (1)Call number: QA 76.9.A25 .S56 2025.
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
73.
Image from Google Jackets
Cryptography / Jeffrey Cook. by
  • Cook, Jeffrey [author.]
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: Jersey City, USA : Alexis Press, 2025
Availability: Items available for loan: College Library (1)Call number: QA 76.9.A25 .C66 2025.
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
74.
Image from Google Jackets
Blockchain technology and its applications / Abigail Murphy. by
  • Murphy, Abigail [author.]
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: New York, NY : 3G E-Learning LLC, 2025
Availability: Items available for loan: College Library (1)Call number: QA 76.9.B56 .M87 2025.
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
75.
Image from Google Jackets
Artificial intelligence in cybersecurity / Elijah Bennett. by
  • Bennett, Elijah [author.]
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: Jersey City, USA : Alexis Press, 2025
Availability: Items available for loan: College Library (1)Call number: QA 76.9 .B46 2025.
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
  • First
  • Previous
  • 1
  • 2
  • 3
  • 4
Not finding what you're looking for?
  • Make a purchase suggestion

SOUTHVILLE LIBRARY

Southville International School and Colleges Library

1281 Tropical Ave. Cor. Luxembourg St., BF Homes International, Las Pinas City

Tel. No. 8256374 / 252358 Loc. 117/146

Powered by Koha