The KCAU Library

Refine your search

Your search returned 68 results.

Sort
Results
41.
Cryptography engineering : design principles and practical applications / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley Pub., inc., c2010
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: QA76.9.A25 F466 2010. Not available: Martin Oduor-Otieno Library: Checked out (1).
42.
Security in distributed computing : did you lock the door? / Glen Bruce, Rob Dempsey. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Saddle River, NJ : Prentice Hall, c1997
Availability: Items available for loan: Martin Oduor-Otieno Library (2)Call number: QA76.9.A25 D454 1997, ...
43.
Secure electronic commerce : building the infrastructure for digital signatures and encryption / Warwick Ford, Michael S. Baum. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Prentice Hall PTR, c1997
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: QA76.9.A25 F655 1997.
44.
Computers under attack : intruders, worms, and viruses / edited by Peter J. Denning. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Reading, Mass. : Addison-Wesley, c1990
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: QA76.9.A25 C667 1990.
45.
Beginning cryptography with Java / David Hook. by Series: Programmer to programmer
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley Pub., 2005
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: QA76.9.A25 H645 2005.
46.
Solaris security / Peter H. Gregory. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Sun Microsystems Press, c2000
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: QA76.9.A25 G75 2000.
47.
Java 2 network security / Marco Pistoia ... [et al.]. by Series: ITSO networking series
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Prentice Hall, c1999
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: QA76.9.A25 J38 1999.
48.
Mission critical! internet security / Bradley Dunsmore ... [et al.] by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Rockland, Mass. : Syngress Publishing, Inc., c2001
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: TK5105.59 .M57 2001.
49.
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Wiley, c2006
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: QA76.9.A25 S35 2006.
50.
Computer Security / Dieter, Gollmann by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London : John Wiley and Sons, Ltd., c2011
Availability: Items available for loan: KCA Kisumu Campus (1)Call number: QA76.9 .A25.G65 2011.
51.
Hacking linux exposed : linux security secrets & solutions / by Brian Hatch, James Lee, George Kurtz. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : McGraw-Hill, c2003
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: QA76.76.O63 H375 2003.
52.
Hacking Linux exposed : linux security secrets & solutions / Brian Hatch, James Lee, George Kurtz. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Osborne/McGraw-Hill, c2001
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: QA76.76.O63 H375 2001.
53.
Hacking exposed : Windows server 2003 / Joel Scambray, Stuart McClure. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : McGraw-Hill/Osborne, c2003
Other title:
  • Hacking Windows server 2003 exposed : Windows security secrets & solutions.
  • Windows security secrets & solutions.
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: QA76.9.A25 S29 2003.
54.
Complete guide to internet privacy, anonymity & security / Matthew Bailey. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Kentucky : Nerel Publication, 2011
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: TK5105.875.I57 B155 2011.
55.
Social engineering : the Science of human hacking / Christopher Hadnagy. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley, c2018
Availability: Items available for loan: Martin Oduor-Otieno Library (2)Call number: QA76.9.C66 H33 2018, ...
56.
Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart. by
Edition: 4th edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Australia : Cengage Learning/Course Technology, 2010
Availability: Items available for loan: Martin Oduor-Otieno Library (2)Call number: HV8079.C65 N45 2010, ...
57.
Securing SQL server : protecting your database from attackers / Denny Cherry. by
Edition: Third edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam : Elsevier/ Syngress, 2015
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: QA76.73.S67 C478 2015.
58.
Introduction to information security : a strategic-based approach / Timothy J. Shimeall, Jonathan M. Spring. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam : Elsevier/Syngress, 2014
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: TK5102.85 .S53 2014.
59.
Wireshark for security professionals : using Wireshark and the Metasploit framework / Jessey Bullock, Jeff T. Parker. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Canada : John Wiley and Sons, Inc., 2017
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: QA76.9.A25 B865 2017.
60.
Complete guide to internet privacy, anonymity & security : how to prevent online tracking and profiling ; be safe from hackers, snoops and surveillance ; avoid cencorship ; and be anonymous online / Matthew Bailey. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: [Kentucky] : Nerel Publication, 2015
Availability: Items available for loan: Martin Oduor-Otieno Library (1)Call number: TK5105.875.I57 B155 2015.
KCAU Library,
KCA University ,
Thika Road Ruaraka
P. O. Box 56808 – 00200 Nairobi, Kenya

More Links