Southville International School and Colleges
Your cart is empty.
  • Cart
  • Lists
    Public lists Eva Luna New books Lux_list list_1
    Your lists Log in to create your own lists
  • Log in to your account
  • Your cookies
  • Search history
Southville International School and Colleges
  • Advanced search
  • Recent comments
  • Most popular
  • Libraries

Log in to your account

Log in with GOOGLE


If you do not have an external account, but do have a local account, you can still log in:

  1. Home
  2. Advanced search
  3. Results of search for 'su:"cyber security"'

Refine your search

  • Availability

    • Limit to records with available items
  • Authors

    • 3G E-learning
  • Holding libraries

    • College Library
  • Item types

    • Book Chapter
    • Books
  • Locations

    • Reserve Section
  • Topics

    • Computer security
    • cyber security
    • CYBER SECURITY

Your search returned 18 results.

Not what you expected? Check for suggestions
Sort
Unhighlight Highlight
Select all Clear all
Select titles to:
Public lists
list_1
New list
Results
1.
Image from Google Jackets
A socio-technical approach to cyber risk management and impact assessment Charitoudi, Konstantinia; Blyth, Andrew
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
2.
Image from Google Jackets
Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model Gordon, Lawrence A.; Loeb, Martin P.; Lucyshyn, William; Zhou, Lei
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
3.
Image from Google Jackets
Cyber terrorism framework Samuels, Darren; Rohsenow, Thomas (PhD)
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
4.
Image from Google Jackets
A conceptual framework for threat assessment based on organization's information security policy Mbowe, Joseph Elias; Zlotnikova, Irina; Msanjila, Simon S.; Oreku, George S.
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
5.
Image from Google Jackets
Clustering methods for replicated criminal websites Samuels, Darren; Rohsenow, Thomas (PhD)
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
6.
Image from Google Jackets
Effect of network traffic on ips performance Mohammadi, Shahriar; Allahvakil, Vahid; Khaghani, Mojtaba
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
7.
Image from Google Jackets
Perception on cyber terrorism: a focus group discussion approach Ahmad, Rabiah; Yunos, Zahri; Sahib, Shahrin; Yusoff, Mariana
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
8.
Image from Google Jackets
Web security and log management: an application centric perspective Kahonge, Andrew Mwaura; Okello-Odongo, William; Miriti, Evans K.; Abade, Elisha
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
9.
Image from Google Jackets
Digital forensics and cyber crime datamining Sindhu, K.K.; Meshram, B.B.
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
10.
Image from Google Jackets
Resilience in leaking dynamic systems modeling of information security Hamacher, Kay
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
11.
Image from Google Jackets
Internet-future business development focus Fang, Xiang; Zhou, Yangping
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
12.
Image from Google Jackets
Experimental evaluation of Cisco Asa-5510 intrusion prevention system against denial of service attacks Gade, Raja Sekhar Reddy; Kumar, Sanjeev
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
13.
Image from Google Jackets
Cyber-physical security of wide-area monitoring, protection and control in a smart grid environment Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
14.
Image from Google Jackets
IP traceback through (authenticated) deterministic flow marking: an empirical evaluation Aghaei-Foroushani, Vahid; Zincir-Heywood, A Nur
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
15.
Image from Google Jackets
Software dysfunction: why do software fail? Ogheneovo, Edward E.
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
16.
Image from Google Jackets
Cyber security 3G E-learning by
  • 3G E-learning
Edition: 3rd edition
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: New York 3G E-learning LLC c2023
Availability: No items available.
star rating
Average : 0.0 out of 5 stars
Save to lists Add to cart (remove)
17.
Image from Google Jackets
Cyber security 3G E-learning by
  • 3G E-learning
Edition: 3rd edition
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: New York 3G E-learning LLC c2023
Availability: No items available.
star rating
Average : 0.0 out of 5 stars
Save to lists Add to cart (remove)
18.
Image from Google Jackets
Cyber security 3G E-learning by
  • 3G E-learning
Edition: 3rd edition
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: New York 3G E-learning LLC c2023
Availability: Items available for loan: College Library (1)Call number: TK 5105.59 .T57 2023.
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
Not finding what you're looking for?
  • Make a purchase suggestion

SOUTHVILLE LIBRARY

Southville International School and Colleges Library

1281 Tropical Ave. Cor. Luxembourg St., BF Homes International, Las Pinas City

Tel. No. 8256374 / 252358 Loc. 117/146

Powered by Koha