Your search returned 36 results. Subscribe to this search

|
21. Chakula

Material type: book Book; Format: print ; Literary form: Not fiction Availability: Items available for reference: MULTIMEDIA UNIVERSITY LIBRARY [Call number: HD9017 .K4 2008] (3).

Log in to add tags. Add to cart
22. Bayesian methods for hackers : probalistic programming and bayesian inference / Cameron Davidson-Pilon

by Davidson-Pilon, C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Addison Wesley, 2015Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9.A25 D38 2015 C.1] (3).

23. Managing information security: John R. Vaca

by Vacca, J.R.

Edition: 2ndMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: Amstardam: Elsevier, 2014Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.59 .V33 2014] (3).

24. Computer and intrusion forensic: George Mohay; Alison Anderson; Byron Collie; Rodney McKemmish

by Mohay, G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2003Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .A25 C628 2003] (2).

25. Security technology convergence insights/ Ray Bernard

by Bernard, R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Armsterdam: Elsevier, 2015Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .B46 2015] (10).

26. Handbook of SCADA/ Control systems security/

Edition: 2ndMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: CRC Press, 2016Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TJ222 .H36 2016] (1).

27. Computer forensics and cyber crime: Britz, M.T. An introduction

by Britz, M.T.

Edition: 2nd.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chennai: Pearson, 2012Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .A25 B77 2012 C.1] (3).

28. SCADA Security : what's broken and how to fix it / Andrew Ginter

by Ginter, A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Calgary: Abterra Technologies Inc, 2016Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TS156.8.G568 2016 C.1 ] (3).

29. International security : problems and solutions/ Patrick M. Morgan

by Morgan, Patrick M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Washington, D.C. : CQ Press, 2006Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: JZ5588 .M67 2006] (3).

30. Information security management principles Taylor, A., .Alexander, D., Finch, A., Sutton, D.

by Taylor, A.

Edition: 2nd.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Swindon: BCS Learning & Development, 2013Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .A25 T375 2013 C.1] (3).

31. The web application hacker's handbook: finding and exploiting security flaws/ Dafydd Stuttard

by Studdard, D.

Edition: 2nd.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley, 2011Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.875 .I57 S852 2011 C.1] (3).

32. Data and computer communications / Williams, S.

by Stallings, W.

Edition: 10th.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Pearson, 2014Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.S73 2014 C.1] (3).

33. Computer And Intrusion Forensics/ George Mohay

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Norwood : Artech House, 2006Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .A25C628 2003 C.1] (1).

34. Process simulation and control using Aspen/ Amiya K. Jana

by Jana, Amiya K.

Edition: 2ndMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Asoke K. Ghosh, 2014Availability: No items available

35. Information security management handbook . Volume 7 edited by Richard O'Hanley

Edition: 6thMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: USA: CRC Press, 2014Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .A25154 2014 C.1] (2).

36. Effect of dividend decisions on market performance of commercial banks listed at Nairobi securities exchange/ Marcy Nekesa Ouma

by Ouma, M.N.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Nairobi, Kenya: 2021Availability: Items available for reference: MULTIMEDIA UNIVERSITY LIBRARY [Call number: THE HD1751.O96 2021] (1).


Mobile:
Email: info@mmu.ac.ke| |Website

Powered by CoreTEC.co.ke.