Refine your search

Your search returned 367 results.

Sort
Results
1.
Computers, ethics, and society / M.David Ermann. by
Edition: 2nd.ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Oxford : OUP, c1997
Availability: Items available for loan: Athi-River Campus (1)Call number: QA 76.9.C66C6575 1997. Nairobi Campus (1)Call number: QA 76.9.C66C6575 1997.

2.
Introduction to computer security / by Matt Bishop. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Delhi : Dorling Kindersley, c2006
Availability: Items available for loan: Athi-River Campus (2)Call number: QA76.9.B57 2006, ... Nairobi Campus (3)Call number: QA76.9.B57 2006, ... Not available: Nairobi Campus: Withdrawn (1).

3.
Cryptography and network security : principles and practice / William Stallings. by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Prentice Hall, c2006
Availability: Items available for loan: Athi-River Campus (3)Call number: TK5105.59.S713 2006, ... Nairobi Campus (2)Call number: TK5105.59.S713 2006, ... Not available: Nairobi Campus: In transit (1).

4.
Computer security / Dieter Gollmann. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chichester, England ; Hoboken, NJ : Wiley, c2006
Availability: Items available for loan: Athi-River Campus (1)Call number: QA76.9.A25G65. Nairobi Campus (1)Call number: QA76.9.A25G65.

5.
Designing network security : a practical guide to creating a secure network infrastructure / by Merike Kaeo. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis : Cisco Press, c2004
Availability: Items available for loan: Athi-River Campus (1)Call number: TK5105.59.K34 2004. Nairobi Campus (1)Call number: TK5105.59.K34 2004.

6.
Computer security fundamentals / Chuck Easttom. by Series: Security series (Upper Saddle River, N.J.)
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Pearson Prentice Hall, c2006
Availability: Items available for loan: Athi-River Campus (1)Call number: QA76.9.A25.E325 c2006. Nairobi Campus (1)Call number: QA76.9.A25.E325 c2006.

7.
Information security applications : 7th International Workshop, WISA 2006 Jeju Island, Korea, August 28-30, 2006 revised selected papers / edited by Jae-Kwang Lee, Okyeon Yi, Moti Yung. by
Edition: ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin : Springer, c2006
Availability: Items available for loan: Athi-River Campus (3)Call number: QA76.9.A25W57 2006, ... Nairobi Campus (1)Call number: QA76.9.A25W57 2006. Not available: Nairobi Campus: Withdrawn (1).

8.
Information assurance for the enterprise : a roadmap to information security / Corey Schou, Dan Shoemaker. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : McGraw-Hill, c2007
Availability: Items available for loan: Athi-River Campus (3)Call number: QA76.9.A25S3523 2007, ... Nairobi Campus (1)Call number: QA76.9.A25S3523 2007. Not available: Mombasa Campus: In transit (1). Nairobi Campus: Withdrawn (1).

9.
Access contested : security, identity, and resistance in Asian cyberspace / Ronald John, Deiberty Palfrey, Rafal Jonathan and Rohozinski Zittrain. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: The MIT Press : Cambridge, 2012
Availability: Items available for loan: Athi-River Campus (1)Call number: HM851.A253 2012. Law School (5)Call number: HM851.A25 2012, ...

10.
Digital fortress / Dan Brown. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : St. Martin's, 2004
Availability: Not available: Athi-River Campus: Pending hold (1).

11.
Fighting computer crime : a new framework for protecting information / Donn B. Parker. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Wiley, 1998
Availability: Items available for loan: Law School (3)Call number: HV6773.P37 1998, ... Not available: Law School: In transit (2).

12.
Computer security : Principles and practice / By William Stallings. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Pearson, Prentice Hall, c2008
Availability: Items available for loan: Athi-River Campus (28)Call number: TBL QA76.9.S73 2008, ... Mombasa Campus (2)Call number: TBL QA76.9.S73 2008, ...

13.
Information assurance for the entrerprise : a roadmap to information security / Corey Schou /Dan Shoemaker. by Series: a roadmap to information security
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : McGraw-Hill Irwin, c2007
Availability: Items available for loan: Athi-River Campus (35)Call number: TBL QA76.9.A25 S3523 2007, ... Mombasa Campus (23)Call number: TBL QA76.9.A25 S3523 2007, ... Nairobi Campus (35)Call number: TBL QA76.9.A25 S3523 2007, ...

14.
Security and control in information systems [electronic resource] : a guide for business and accounting / Andrew Hawker. by Series: Routledge information systems textbooks ; 1.
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: London : Routledge, 2000
Availability: No items available.

15.
Hack proofing ColdFusion [electronic resource] / Greg Meyer ... [et al.]. by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Rockland, Mass. : Syngress Publishing, Inc., c2002
Other title:
  • Hackproofing ColdFusion
Availability: No items available.

16.
17.
Hack proofing Sun Solaris 8 [electronic resource] / Thomas Vincent. by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Rockland, Mass. : London : Syngress Media ; International Thomson, 2001
Availability: No items available.

18.
Hack proofing XML [electronic resource] / Neal O'Farrell. by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Rockland, Mass. : Syngress Media, 2002
Availability: No items available.

19.
Hack proofing your Web applications [electronic resource] : the only way to stop a hacker is to think like one / [Jeff Forristal ... [et al.] ; Julie Traxler, technical editor]. by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Rockland, Mass. : London : Syngress Media ; International Thomson, c2001
Availability: No items available.

20.
Hack proofing Linux: a guide to open source security [electronic resource] : the only way to stop a hacker is to think like one / James Stanger, Patrick T. Lane. by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Rockland, Mass. : London : Syngress Media ; International Thomson, c2001
Availability: No items available.