The KCAU Library

Refine your search

Your search returned 68 results.

Sort
Results
21.
Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz. by
Edition: 5th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Tata McGraw-Hill Publishing Company Ltd., c2005
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: TK5105.59 .M48 2005.
22.
Cryptography and network security : principles and practice / William Stallings. by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, Inc./Dorling Kindersley Publishing Inc., c2006
Availability: Items available for loan: KCA Kisumu Campus (1)Call number: TK5105.59 .S713 2006.
23.
The ethical hacking guide to corporate security / Ankit Fadia. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Macmillan India Ltd., 2004
Other title:
  • Corporate security
Availability: Items available for loan: Martin Oduor-Otieno Library (3)Call number: HF5548.37 .F33 2004, ...
24.
Information assurance for the enterprise : a roadmap to information security / Corey Schou & Dan Shoemaker. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Tata McGraw-Hill, c2007
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: QA76.9.A25 S3523 2007.
25.
Unofficial guide to ethical hacking / Ankit Fadia. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Delhi : Macmillan, 2001
Availability: Items available for loan: Martin Oduor-Otieno Library (2)Call number: QA76.9.A25 F33 2001, ...
26.
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger,Devin Shah. by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Prentice Hall, c2007
Availability: Items available for loan: Town Campus Library (1)Call number: QA76.9.A25 P45 2007. Martin Oduor-Otieno Library (1)Call number: QA76.9.A25 P45 2007. Items available for reference: KCA Kisumu Campus: Not for loan (1)Call number: QA76.9.A25 P45 2007.
27.
The complete guide to Internet security / Mark S. Merkow & James Breithaupt. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : AMACOM, c2000
Availability: Items available for loan: Martin Oduor-Otieno Library (2)Call number: TK5105.875.I57 M465 2000, ...
28.
Computer security : art and science / Matt Bishop. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, 2003
Availability: Items available for reference: KCA Kisumu Campus: Not for loan (1)Call number: QA76.9.A25 B56 2003.
29.
Computer security / Dieter Gollmann. by Series: Worldwide series in computer science
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chichester : Wiley, c1999
Availability: Items available for loan: KCA Kitengela Campus Library (1)Call number: QA76.9.A25 G65 1999. Martin Oduor-Otieno Library (3)Call number: QA76.9.A25 G65 1999, ...
30.
Protect your information with intrusion detection / Alex Lukatsky. by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: New Delhi : BPB Publications, c2003
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: TK5105.59 .L88 2003.
31.
Encryption : protecting your data / Ankit Fadia and Jaya Bhattacharjee. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Vikas Publishing House PVT Ltd., c2007
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: QA76.9.A25 F32 2007.
32.
Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner. by Series: Prentice Hall series in computer networking and distributed systems
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Prentice, c2002
Availability: Items available for loan: KCA Kisumu Campus (1)Call number: QA76.9.A25 K39 2002. Martin Oduor-Otieno Library (2)Call number: QA76.9.A25 K39 2002, ...
33.
Computer crime and computer forensics / R. K. Tewari, P. K. Sastry and K. V. Ravi Kumar. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Delhi : Select Publishers, c2002
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: QA76.9.A25 T46 2002.
34.
Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, c2002
Availability: Not available: Martin Oduor-Otieno Library: Checked out (1).
35.
Designing network security / Merike Kaeo. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Cisco Press, c2004
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: TK5105.59 .K34 2004.
36.
Protect your information with intrusion detection / Alex Lukatsky. by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: New Delhi : BPB Publications, 2003
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: TK5105.59 .L88 2003.
37.
Hacking exposed : web applications / Joel Scambray, Mike Shema & Caleb Sima by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Tata McGraw-Hill, c2006
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: TK5105.59 .S32 2006.
38.
Computer forensics jumpstart / Michael G. Solomon...et al. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Indiana : Wiley Publishing, Inc. ©2011
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: QA76.9.A25 S6556 2011.
39.
Cryptography and public key infrastructure on the Internet / Klaus Schmeh. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English Original language: German
Publication details: Chichester, West Sussex, England : Wiley, c2003
Availability: Items available for loan: Martin Oduor-Otieno Library (2)Call number: QA76.9.A25 S34513 2003, ...
40.
Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and business executives / Erik Laykin. by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Hoboken, New Jersey : John Wiley, 2013
Online resources:
Availability: Items available for loan: Martin Oduor-Otieno Library (2)Call number: HV8079.C65 L395 2013, ...
Lists:
KCAU Library,
KCA University ,
Thika Road Ruaraka
P. O. Box 56808 – 00200 Nairobi, Kenya

More Links