Your search returned 18 results. Subscribe to this search

|
1. Network Security: A Begginers Guide

by Maiwald, E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London ; Mccgraw Hill ; 2001Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.59 .M35 2001] (1).

Place hold Log in to add tags. Add to cart
2. Crytography and Network Security :principles and practice/ Stallings William

by Stalling, William.

Edition: 2ndMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey ; Prentice Hall ; 1999Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5102.94 .S73 2017] (2).

3. Guide to Computer Forensics and Investigations

by Bill Nelson.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia ; Thomson ; 2004Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: HV8079.C65G85 2004] (5).

4. Computer security and cryptography / Alan G.Konheim

by Konheim, A. G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Wiley-interscience, 2007Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9.A25K63 2007 C.1] (3).

5. International handbook of computer security

by Shim, Jae K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London Global Professional Pub 2008Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA 76.9 .A25S468 2008] (1).

6. Introduction to network security/ Theory and practice Jie Wang, Zachary A. Kissel

by Wang, Jie.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: India Wiley 2015Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.59 .W356] (1).

7. Cybersecurity and cyberwar : what everyone needs to know / P.W. Singer

by Singer P.W | Allan Friedman.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: USA: Oxford University 2014Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9.S56 2014] (1).

8. Computer forensics : computer crime scene investigation / John R. Vacca

by Vacca, J.R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Firewall Media, 2004Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9.A25V33 2004] (1).

9. Security in computing/ Charles P. Pfleeger and Shri Lawrence Pfleeger

by Pfleeger Charles P | Pfleeger Shari Lawrence | Shah Deven.

Edition: 4th.ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London Pearson 2009Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .P45 C.1] (3).

10. Bayesian methods for hackers : probalistic programming and bayesian inference / Cameron Davidson-Pilon

by Davidson-Pilon, C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Addison Wesley, 2015Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9.A25 D38 2015 C.1] (3).

11. Computer and intrusion forensic: George Mohay; Alison Anderson; Byron Collie; Rodney McKemmish

by Mohay, G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2003Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .A25 C628 2003] (2).

12. Security technology convergence insights/ Ray Bernard

by Bernard, R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Armsterdam: Elsevier, 2015Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .B46 2015] (10).

13. Computer forensics and cyber crime: Britz, M.T. An introduction

by Britz, M.T.

Edition: 2nd.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chennai: Pearson, 2012Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .A25 B77 2012 C.1] (3).

14. SCADA Security : what's broken and how to fix it / Andrew Ginter

by Ginter, A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Calgary: Abterra Technologies Inc, 2016Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TS156.8.G568 2016 C.1 ] (3).

15. Information security management principles Taylor, A., .Alexander, D., Finch, A., Sutton, D.

by Taylor, A.

Edition: 2nd.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Swindon: BCS Learning & Development, 2013Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .A25 T375 2013 C.1] (3).

16. The web application hacker's handbook: finding and exploiting security flaws/ Dafydd Stuttard

by Studdard, D.

Edition: 2nd.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley, 2011Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.875 .I57 S852 2011 C.1] (3).

17. Data and computer communications / Williams, S.

by Stallings, W.

Edition: 10th.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Pearson, 2014Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: TK5105.S73 2014 C.1] (3).

18. Computer And Intrusion Forensics/ George Mohay

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Norwood : Artech House, 2006Availability: Items available for loan: MULTIMEDIA UNIVERSITY LIBRARY [Call number: QA76.9 .A25C628 2003 C.1] (1).


Mobile:
Email: info@mmu.ac.ke| |Website

Powered by CoreTEC.co.ke.