Your search returned 32 results.

Not what you expected? Check for suggestions
Sort
Results
1.
Viruses revealed / David Harley, Robert Slade, Urs Gattiker. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berkeley, Calif. : Osborne/McGraw-Hill, c2001
Availability: Items available for loan: Nairobi Campus Library (2)Call number: QA76.76.C68 H37 2001, ... Thika Main Campus Library (1)Call number: QA76.76.C68 H37 2001.

2.
Information security management handbook / Micki Krause, Harold F. Tipton, editors. by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : Auerbach, c2000-<c2003 >
Online resources:
Availability: Items available for loan: Thika Main Campus Library (1)Call number: QA76.9.A25 H36 2000.

3.
Creating the secure managed desktop : using group policy, SoftGrid, Microsoft deployment toolkit, and other management tools / Jeremy Moskowitz. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Ind. : Wiley Pub., c2008
Availability: Items available for loan: Kakamega ODEL Library (1)Call number: QA76.76.W56 M685 2008.

4.
Security in computing / Charles P. Pfleeger. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Prentice Hall PTR, c1997
Availability: Items available for loan: Kitale ODEL Library (1)Call number: QA76.9.A25 P45 1997.

7.
Cryptography and network security / Behrouz A. Forouzan by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston McGraw-Hill 2008
Availability: Items available for loan: Thika Main Campus Library (1)Call number: TK5105.59 .F67 2008.

8.
The new school of information security / Adam Shostack and Andrew Stewart. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2008
Online resources:
Availability: Items available for loan: Thika Main Campus Library (1)Call number: HD30.2 .S563 2008.

9.
Hiding in plain sight : steganography and the art of covert communication / Eric Cole. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Wiley Pub., c2003
Availability: Items available for loan: Nairobi Campus Library (1)Call number: QA76.9.A25 C598 2003.

10.
Introduction to security : operations and management / P.J. Ortmeier. by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Pearson, 2012
Availability: Items available for loan: Thika Main Campus Library (1)Call number: HV8290 .O78 2012.

11.
Hunting security bugs / Tom Gallagher, Bryan Jeffries, Lawrence Landauer. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Redmond, Wash. : Microsoft Press, c2006
Availability: Not available: Mombasa Campus Library: In transit (1).

12.
Information security : principles and practices / Mark S. Merkow, Jim Breithaupt. by Series:
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Pearson Prentice Hall, c2006
Availability: Items available for loan: Mombasa Campus Library (1)Call number: QA76.9.A25 M485 2006.

13.
Internet security and firewalls / V.V. Preetham with NIIT. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cincinnati, Ohio : Premier Press, c2002
Availability: Items available for loan: Mombasa Campus Library (1)Call number: TK5105.59 .P74 2002.

14.
Computer security basics / Rick Lehtinen, Deborah Russell and G.T. Gangemi, Sr. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Sebastopol, CA : O'Reilly & Associates, c2006
Availability: Items available for loan: Mombasa Campus Library (1)Call number: QA76.9.A25 R87 2006.

15.
Computer security : principles and practice / William Stallings, Lawrie Brown ; with contributions by Mick Bauer [and] Michael Howard. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Prentice Hall, c2008
Availability: Items available for loan: KIGALI CAMPUS LIBRARY (1)Call number: QA76.9.A25 S685 2008.

16.
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Wiley, c1996
Availability: Items available for loan: KIGALI CAMPUS LIBRARY (1)Call number: QA76.9.A25 S35 1996.

17.
Incident response and computer forensics / Chris Prosise, Kevin Mandia. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New York, New York : McGraw-Hill/Osborne, c2003
Availability: Not available: Nakuru Campus Library: Checked out (1).

19.
Digital fortress / Dan Brown. by
Material type: Text Text; Format: print ; Literary form: Fiction
Publication details: New York : St. Martin's Paperbacks, 1998
Availability: Items available for loan: Nakuru Campus Library (1)Call number: PS3552.R685434 1998. Thika Main Campus Library (1)Call number: PS3552.R685434 1998.

20.
Investigative data mining for security and criminal detection / Jesús Mena. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam ; Boston, MA : Butterworth-Heinemann, 2003
Availability: Items available for loan: Nairobi Campus Library (1)Call number: QA76.9.D343 M44 2003.

Pages
© 2019 Mount Kenya University Library
P. O. Box 342-01000,
Thika, Kenya

Powered by Koha