Your search returned 10 results.

Computer forensics and cyber crime. Marjie T. Britz.

by Britz, Marjie T.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Jersey; Pearson prentice hall, 2003Availability: Items available for loan: 1 Call number: QA 76.9 .A25B77 2003.

Guide to Linux networking and security Nicholas Wells

by Wells, Nicholas.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Australia : Course Technology, Thomson Learning, ©2003Availability: Items available for loan: 1 Call number: QA 76.76 O3W45 2003.

Security+ guide to network security fundamentals/ Mark Ciampa.

by Ciampa, Mark.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston, Mass : Thomson/Course Technology, ©2005Availability: Items available for loan: 2 Call number: TK 5105.59 .C53 2005, ...

Computers at risk : safe computing in the information age /

by National Research Council (U.S.). Computer Science and Telecommunications Board. System Security Study Committee.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Washington, D.C. : National Academy Press, 1991Online access: Online version Availability: Items available for loan: 1 Call number: QA 76.9.A25C6663 1990.

Network security essentials : applications and standards / William Stallings.

by Stallings, William.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Jersey: Prentice Hall, 2003Availability: Items available for loan: 1 Call number: TK 5105.59 .S725 2002.

Security in computing/ Charles P. Pfleeger and Shari Lawrence Pfleeger

by Pfleeger, Charles P, 2003 | Pfleeger, Shari Lawrence.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Jersey, Prentice Hall, 2003Availability: Items available for loan: 1 Call number: QA 76.9.A25P45 2003.

NT Network security/ Matthew Strebe,Charles Perkins and Michael G. Moncur.

by Strebe Matthew | Perkins, Charles | Moncur, Michael G.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: USA: SYBEX, Network press, 1998Availability: Items available for loan: 1 Call number: TK 5105.59 .S77 1998.

Guide to Network Defense and Countermeasures/ Michael E.Whiteman and Herbert J.Mattord.

by Whiteman .E. Michaei.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Australia: Thomson Course Technology, 2003Availability: Items available for loan: 1 Call number: TK 5105.59 .H65 2003.

Network security : a beginner's guide / Eric Maiwald.

by Maiwald, Eric.

Series: Network professional's libraryMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : Osborne/McGraw-Hill, c2001Online access: Publisher description | Table of contents | Contributor biographical information Availability: Items available for loan: 1 Call number: TK 5105.59 M35 2001.

Applied cryptography : protocols, algorithms, and source code in C/

by Schneier, Bruce, 1963.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: NewYork: John Wiley & Sons, Inc., 1996Availability: Items available for loan: 1 Call number: QA 76.9 .A25S35 1996.

© Machakos University Library, Along The Highway, Machakos Wote Rd, Machakos, Kenya P.O. Box 136 - 90100 Machakos - Kenya

Tel: ( +254 ) 723 805829 OR Fax : 044-20353 OR Email: library@mksu.ac.ke