Your search returned 15 results.

Not what you expected? Check for suggestions
Sort
Results
1.
Viruses revealed / David Harley, Robert Slade, Urs Gattiker. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berkeley, Calif. : Osborne/McGraw-Hill, c2001
Availability: Items available for loan: Nairobi Campus Library (2)Call number: QA76.76.C68 H37 2001, ... Thika Main Campus Library (1)Call number: QA76.76.C68 H37 2001.

2.
Creating the secure managed desktop : using group policy, SoftGrid, Microsoft deployment toolkit, and other management tools / Jeremy Moskowitz. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Ind. : Wiley Pub., c2008
Availability: Items available for loan: Kakamega ODEL Library (1)Call number: QA76.76.W56 M685 2008.

3.
Security in computing / Charles P. Pfleeger. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Prentice Hall PTR, c1997
Availability: Items available for loan: Kitale ODEL Library (1)Call number: QA76.9.A25 P45 1997.

4.
The art of computer virus research and defense / Peter Szor. by
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Specialized;
Publication details: Upper Saddle River, NJ : Addison-Wesley, 2005
Online resources:
Availability: Items available for loan: NKUBU CAMPUS LIBRARY (1)Call number: QA76.76.C68 S96 2005.

5.
Cryptography and network security / Behrouz A. Forouzan by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston McGraw-Hill 2008
Availability: Items available for loan: Thika Main Campus Library (1)Call number: TK5105.59 .F67 2008.

6.
The new school of information security / Adam Shostack and Andrew Stewart. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2008
Online resources:
Availability: Items available for loan: Thika Main Campus Library (1)Call number: HD30.2 .S563 2008.

7.
Hiding in plain sight : steganography and the art of covert communication / Eric Cole. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Wiley Pub., c2003
Availability: Items available for loan: Nairobi Campus Library (1)Call number: QA76.9.A25 C598 2003.

8.
Introduction to security : operations and management / P.J. Ortmeier. by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Pearson, 2012
Availability: Items available for loan: Thika Main Campus Library (1)Call number: HV8290 .O78 2012.

9.
Hunting security bugs / Tom Gallagher, Bryan Jeffries, Lawrence Landauer. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Redmond, Wash. : Microsoft Press, c2006
Availability: Items available for loan: Mombasa Campus Library (1)Call number: QA76.9.A25 G356 2006.

10.
Information security : principles and practices / Mark S. Merkow, Jim Breithaupt. by Series:
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Pearson Prentice Hall, c2006
Availability: Items available for loan: Mombasa Campus Library (1)Call number: QA76.9.A25 M485 2006.

11.
Computer security basics / Rick Lehtinen, Deborah Russell and G.T. Gangemi, Sr. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Sebastopol, CA : O'Reilly & Associates, c2006
Availability: Items available for loan: Mombasa Campus Library (1)Call number: QA76.9.A25 R87 2006.

12.
Computer security : principles and practice / William Stallings, Lawrie Brown ; with contributions by Mick Bauer [and] Michael Howard. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Prentice Hall, c2008
Availability: Items available for loan: KIGALI CAMPUS LIBRARY (1)Call number: QA76.9.A25 S685 2008.

13.
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Wiley, c1996
Availability: Items available for loan: KIGALI CAMPUS LIBRARY (1)Call number: QA76.9.A25 S35 1996.

14.
Incident response and computer forensics / Chris Prosise, Kevin Mandia. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New York, New York : McGraw-Hill/Osborne, c2003
Availability: Items available for loan: Nakuru Campus Library (1)Call number: HV6773 .P766 2003.

15.
Investigative data mining for security and criminal detection / Jesús Mena. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam ; Boston, MA : Butterworth-Heinemann, 2003
Availability: Items available for loan: Nairobi Campus Library (1)Call number: QA76.9.D343 M44 2003.

Pages
© 2019 Mount Kenya University Library
P. O. Box 342-01000,
Thika, Kenya

Powered by Koha