Your search returned 29 results. Subscribe to this search

|
1. Risk analysis and control : a guide for DP managers / by Kenneth K. Wong.

by Wong, Kenneth Kiu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Manchester : Rochelle Park, N.J. : NCC Publications ; Hayden Book, 1977Availability: Items available for loan: [Call number: HF5548 .2.W64 1977] (1).
2. Network security : a beginner's guide / Eric Maiwald.

by Maiwald, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Osborne/McGraw-Hill, c2001Online access: Publisher description | Table of contents | Contributor biographical information Availability: Items available for loan: [Call number: TK5105.59.M35 2001] (1).
3. Data & computer security : dictionary of standards, concepts, and terms / Dennis Longley, Michael Shain.

by Longley, Dennis | Shain, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York, N.Y. : Stockton Press, 1987Availability: No items available
4. Data & computer security : dictionary of standards, concepts, and terms / Dennis Longley, Michael Shain.

by Longley, Dennis | Shain, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York, N.Y. : Stockton Press, 1987Availability: Items available for loan: [Call number: QA76.9.A25.L66 1987] (1).
5. The Stephen Cobb complete book of PC and LAN security / Stephen Cobb.

by Cobb, Stephen, 1952-.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Blue Ridge Summit, PA : Windcrest : TAB, Software Dept. [distributor], c1992Availability: Items available for loan: [Call number: TK5105.7.C62 1990] (1).
6. Cryptography : an introduction to computer security / Jennifer Seberry, Josef Pieprzyk.

by Seberry, Jennifer, 1944- | Pieprzyk, Josef, 1949-.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Prentice-Hall, c1989Availability: Items available for loan: [Call number: QA76.9.A25.S37 1988] (1).
7. Information assurance for the enterprise : a roadmap to information security / Corey Schou, Dan Shoemaker.

by Schou, Corey | Shoemaker, Dan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston : McGraw-Hill Irwin, c2007Online access: Publisher description | Table of contents only | Contributor biographical information Availability: Items available for loan: [Call number: QA76.9.A25 .S35 2007] (4).
8. Academic learning series : Security+ certification : textbook / Joern Wettern.

by Wettern, Joern.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Redmond, WA : Microsoft Press, c2005Other title: Security+ certification textbook.Availability: Items available for loan: [Call number: QA76.3 .W46 2005] (1).
9. Academic learning series : Security+ certification : textbook / Joern Wettern.

by Wettern, Joern.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Redmond, WA : Microsoft Press, c2005Other title: Security+ certification textbook.Availability: No items available
10. Computer security : Information assurance and security series

by Potts, John S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Nova Science Publishers, 2006Availability: Items available for loan: [Call number: QA76.9.A25.C66 2006] (1).
11. Investigative data mining for security and criminal detection / Jesús Mena.

by Mena, Jesus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam ; Boston, MA : Butterworth-Heinemann, 2003Online access: Publisher description | Table of contents Availability: Items available for loan: [Call number: QA76.9.M46 2003] (1).
12. Management of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston, Mass. : Thomson Course Technology, c2006Availability: Items available for loan: [Call number: TK5105.59 .W45 2006] (1).
13. Cyber defense mechanisms [electronic resource] : security, privacy, and challenges / edited by Gautam Kumar, Dinesh Kumar Saini, and Nguyen Ha Huy Cuong.

by Kumar, Gautam, 1990- | Saini, Dinesh Kumar, 1974- | Cuong, Nguyen Ha Huy.

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton, FL : CRC Press, 2021Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available
14. Information security and optimization / edited by Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta.

by Tanwar, Rohit [editor.] | Choudhury, Tanupriya [editor.] | Zamani, Mazdak [editor.] | Gupta, Sunil, 1979- [editor.].

Edition: First edition.Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : C&H\CRC Press, 2021Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available
15. Cyber-security threats, actors, and dynamic mitigation / edited by Nicholas Kolokotronis and Stavros Shiaeles.

by Kolokotronis, Nicholas [editor.] | Shiaeles, Stavros [editor.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2021Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available
16. Secret history the story of cryptology / Craig P. Bauer.

by Bauer, Craig P [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Boca Raton : Chapman & Hall/CRC, 2021Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available
17. Digital forensics explained / Greg Gogolin.

by Gogolin, Greg [editor.].

Edition: 2nd.Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2021Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available
18. Behavioral cybersecurity : fundamental principles and applications of personality psychology / Wayne Patterson, Cynthia E. Winston-Proctor.

by Patterson, Wayne, 1945- [author.] | Winston-Proctor, Cynthia E [author.].

Edition: 1st.Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2020Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available
19. Cyber arms : security in cyberspace / Stanislav Abaimov, Cyber Security and Electronic Engineering, University of Rome, Tor Vergata Rome, Italy, Maurizio Martellini, Department of Science and High Technology, University of Uninsubria Como, Italy.

by Abaimov, Stanislav, 1989- [author.] | Martellini, M. (Maurizio) [author.].

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton, FL : CRC Press, Taylor & Francis Group, [2020]Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available
20. Attribute-Based Encryption and Access Control [electronic resource] / Dijiang Huang, Qiuxiang Dong, Yan Zhu.

by Huang, Dijiang | Dong, Qiuxiang | Zhu, Yan (Professor of computer security).

Material type: book Book; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press LLC, 2020Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue