@ILAB - MST (Books - Combined)

| Select titles to:
Anthropology for rebels : a different way of doing philosophical anthropology / Juan Fernando Selles: translated by John Branya

by Selles, Juan Fernando | Branya, John.

Publisher: Nairobi, Strathmore University c2011Availability: Items available for loan: Strathmore University Library [Call number: GN24.S45 2011] (7). Checked out (3).
Applying UML and patterns Larman, C.

by Larman, C.

Publisher: New Jersey Prentice Hall PTR 2001Availability: Items available for loan: Strathmore University Library [Call number: QA76.9.O35 L37 2001] (2). Withdrawn (1).
Applying UML and patterns : an introduction to object-oriented analysis and design and iterative development / Craig Larman.

by Larman, Craig.

Edition: 3rd ed.Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c2005. Availability: Items available for loan: Strathmore University Library [Call number: QA76.9.O35L37 2004] (5).
Case studies in information and computer ethics Spinello, R.

by Spinello, R.

Publisher: New Jersey Prentice Hall 1997Availability: Items available for loan: Strathmore University Library [Call number: QA76.9.M65S65 1997] (3).
CISM practice question database v9 Information Systems Audit and Control Association

by Information Systems Audit and Control Association | Information Systems Audit and Control Association.

Publisher: Rolling Meadows, IL : Information Systems Audit and Control Association Other title: Certified Information Security Manager review manual.Availability: Items available for loan: Strathmore University Library [Call number: QA76.9.C57 2008] (1).
CISM review manual 2009.

by Information Systems Audit and Control Association.

Publisher: Rolling Meadows, IL : Information Systems Audit and Control Association Other title: Certified Information Security Manager review manual.Availability: No items available Withdrawn (5).
Codes and ciphers / Fred B. Wrixon.

by Wrixon, Fred B.

Edition: 1st ed.Publisher: New York : Prentice Hall, c1992Availability: Items available for loan: Strathmore University Library [Call number: Z103.3.W75 1992] (1).
Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience, and ROI / Debra S. Herrmann.

by Herrmann, Debra S.

Publisher: Boca Raton : Auerbach Publications, c2007Online access: Publisher description Availability: Items available for loan: Strathmore University Library [Call number: TK5102.85.H4685 2007] (1).
Computer crime a crimefighter's handbook Icove, D., Seger, K. and VonStorch, W.

by Icove, D | Seger, K | VonStorch, W.

Publisher: Suite A Sebastopol O'Reilly & Associates Incorporation 1995Availability: Items available for loan: Strathmore University Library [Call number: HV6773.I36 1995] (1).
Computer network security and cyber ethics Kizza, JM.

by Kizza, JM.

Publisher: Jefferson, North Carolina McFarland and Company, Inc, Publishers 2002Availability: Items available for loan: Strathmore University Library [Call number: TK5105.59.K58 2002] (1).
Computer security : art and science / Matt Bishop.

by Bishop, Matt.

Publisher: Boston : Addison-Wesley, 2003Availability: Items available for loan: Strathmore University Library [Call number: QA76.9.A25 B56 2002] (12).
Computer security : a handbook for management / Leonard H. Fine.

by Fine, Leonard H | Irish Management Institute.

Publisher: London : Heinemann in association with the Irish Management Institute, 1983Availability: Items available for loan: Strathmore University Library [Call number: QA76.9.A25F53 1983] (1).
Computer security handbook edited by Hutt, AE., Bosworth, S., Hoyt, DB.

by Bosworth, S. (ed.) | Hoyt, DB | Hutt, AE. (ed.).

Edition: 3rdPublisher: New York John Wiley & Sons 1995Availability: Items available for loan: Strathmore University Library [Call number: HF5548.37.C64 1995] (3).
Computer security within organizations Warman, AR.

by Warman, AR.

Publisher: London, UK Macmillan Publising Co. Inc 1993Availability: Items available for loan: Strathmore University Library [Call number: QA76.9.A25W37 1993] (1).
Computers, ethics, and society / edited by M. David Ermann, Mary B. Williams, Michele S. Shauf.

by Ermann, M. David | Williams, Mary B | Shauf, Michele S.

Edition: 2nd ed.Publisher: New York : Oxford University Press, 1997Online access: Publisher description | Table of contents only Availability: Items available for loan: Strathmore University Library [Call number: QA76.9.C66C6575 1997] (3).
Cryptography and network security Behrouz A. Forouzan.

by Forouzan, Behrouz.

Edition: International ed.Publisher: Boston: McGraw-Hill Companies, 2008Availability: Items available for loan: Strathmore University Library [Call number: TK5105.59.F67 2008] (10).
Cryptography and network security Principles and pratices

Edition: 4th edPublisher: Upper Saddle River, NJ Pearson Prentice Hall 2006Availability: Items available for loan: Strathmore University Library [Call number: TK5105.59.S713 2006] (10).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 4th ed.Publisher: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006Availability: Items available for loan: Strathmore University Library [Call number: TK5105.59.S713 2006] (6).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Publisher: New Delhi, India Prentice Hall-of India 2003Availability: No items available In transit (1).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Publisher: Upper Saddle River, New Jersey Prentice Hall/Pearson Education International 2003Availability: Items available for loan: Strathmore University Library [Call number: TK5105.59.S713 2003] (2).
 <<  <  1  2  3  4    >>
Log in to create new lists.

© Strathmore University Library Madaraka Estate Ole, Sangale Road P. O. Box 59857 00200 City Square Nairobi Kenya
Tel.: (+254) (0)703 034000/(0)703 034200/(0)703 034300 Fax.: (+254) (0)20-607498