|
21.
|
Chakula Material type: Book; Format:
print
; Literary form:
Not fiction
Availability: Items available for reference: MULTIMEDIA UNIVERSITY LIBRARY [Call number: HD9017 .K4 2008] (3).
|
|
22.
|
Bayesian methods for hackers : probalistic programming and bayesian inference / Cameron Davidson-Pilon
by Davidson-Pilon, C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Addison Wesley, 2015Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9.A25 D38 2015 C.1] (3).
|
|
23.
|
Managing information security: John R. Vaca
by Vacca, J.R. Edition: 2ndMaterial type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amstardam: Elsevier, 2014Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.59 .V33 2014] (3).
|
|
24.
|
Computer and intrusion forensic: George Mohay; Alison Anderson; Byron Collie; Rodney McKemmish
by Mohay, G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2003Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .A25 C628 2003] (2).
|
|
25.
|
Security technology convergence insights/ Ray Bernard
by Bernard, R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Armsterdam: Elsevier, 2015Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .B46 2015] (10).
|
|
26.
|
Handbook of SCADA/ Control systems security/ Edition: 2ndMaterial type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: CRC Press, 2016Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TJ222 .H36 2016] (1).
|
|
27.
|
Computer forensics and cyber crime: Britz, M.T. An introduction
by Britz, M.T. Edition: 2nd.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chennai: Pearson, 2012Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .A25 B77 2012 C.1] (3).
|
|
28.
|
SCADA Security : what's broken and how to fix it / Andrew Ginter
by Ginter, A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Calgary: Abterra Technologies Inc, 2016Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TS156.8.G568 2016 C.1 ] (3).
|
|
29.
|
International security : problems and solutions/ Patrick M. Morgan
by Morgan, Patrick M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Washington, D.C. : CQ Press, 2006Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: JZ5588 .M67 2006] (3).
|
|
30.
|
Information security management principles Taylor, A., .Alexander, D., Finch, A., Sutton, D.
by Taylor, A. Edition: 2nd.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Swindon: BCS Learning & Development, 2013Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .A25 T375 2013 C.1] (3).
|
|
31.
|
The web application hacker's handbook: finding and exploiting security flaws/ Dafydd Stuttard
by Studdard, D. Edition: 2nd.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: John Wiley, 2011Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.875 .I57 S852 2011 C.1] (3).
|
|
32.
|
Data and computer communications / Williams, S.
by Stallings, W. Edition: 10th.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Pearson, 2014Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.S73 2014 C.1] (3).
|
|
33.
|
Computer And Intrusion Forensics/ George Mohay Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Norwood : Artech House, 2006Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .A25C628 2003 C.1] (1).
|
|
34.
|
Process simulation and control using Aspen/ Amiya K. Jana
by Jana, Amiya K. Edition: 2ndMaterial type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Asoke K. Ghosh, 2014Availability: No items available
|
|
35.
|
Information security management handbook . Volume 7 edited by Richard O'Hanley Edition: 6thMaterial type: Book; Format:
print
; Literary form:
Not fiction
Publisher: USA: CRC Press, 2014Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .A25154 2014 C.1] (2).
|
|
36.
|
Effect of dividend decisions on market performance of commercial banks listed at Nairobi securities exchange/ Marcy Nekesa Ouma
by Ouma, M.N. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Nairobi, Kenya: 2021Availability: Items available for reference: MULTIMEDIA UNIVERSITY LIBRARY [Call number: THE HD1751.O96 2021] (1).
|