@ILAB - MST (Books - Combined)

| Select titles to:
Anthropology for rebels : a different way of doing philosophical anthropology / Juan Fernando Selles: translated by John Branya

by Selles, Juan Fernando | Branya, John.

Publisher: Nairobi, Strathmore University c2011Availability: Items available for loan: Strathmore University (Main Library) [Call number: GN24.S45 2011] (10).
Applying UML and patterns Larman, C.

by Larman, C.

Publisher: New Jersey Prentice Hall PTR 2001Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.9.O35 L37 2001] (2). Withdrawn (1).
Applying UML and patterns : an introduction to object-oriented analysis and design and iterative development / Craig Larman.

by Larman, Craig.

Edition: 3rd ed.Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c2005. Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.9.O35L37 2004] (5).
Case studies in information and computer ethics Spinello, R.

by Spinello, R.

Publisher: New Jersey Prentice Hall 1997Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.9.M65S65 1997] (3).
CISM practice question database v9 Information Systems Audit and Control Association

by Information Systems Audit and Control Association | Information Systems Audit and Control Association.

Publisher: Rolling Meadows, IL : Information Systems Audit and Control Association Other title: Certified Information Security Manager review manual.Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.9.C57 2008] (1).
CISM review manual 2009.

by Information Systems Audit and Control Association.

Publisher: Rolling Meadows, IL : Information Systems Audit and Control Association Other title: Certified Information Security Manager review manual.Availability: No items available Withdrawn (5).
Codes and ciphers / Fred B. Wrixon.

by Wrixon, Fred B.

Edition: 1st ed.Publisher: New York : Prentice Hall, c1992Availability: Items available for loan: Strathmore University (Main Library) [Call number: Z103.3.W75 1992] (1).
Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience, and ROI / Debra S. Herrmann.

by Herrmann, Debra S.

Publisher: Boca Raton : Auerbach Publications, c2007Online access: Publisher description Availability: Items available for loan: Strathmore University (Main Library) [Call number: TK5102.85.H4685 2007] (1).
Computer crime a crimefighter's handbook Icove, D., Seger, K. and VonStorch, W.

by Icove, D | Seger, K | VonStorch, W.

Publisher: Suite A Sebastopol O'Reilly & Associates Incorporation 1995Availability: Items available for loan: Strathmore University (Main Library) [Call number: HV6773.I36 1995] (1).
Computer network security and cyber ethics Kizza, JM.

by Kizza, JM.

Publisher: Jefferson, North Carolina McFarland and Company, Inc, Publishers 2002Availability: Items available for loan: Strathmore University (Main Library) [Call number: TK5105.59.K58 2002] (1).
Computer security : art and science / Matt Bishop.

by Bishop, Matt.

Publisher: Boston : Addison-Wesley, 2003Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.9.A25 B56 2002] (12).
Computer security : a handbook for management / Leonard H. Fine.

by Fine, Leonard H | Irish Management Institute.

Publisher: London : Heinemann in association with the Irish Management Institute, 1983Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.9.A25F53 1983] (1).
Computer security handbook edited by Hutt, AE., Bosworth, S., Hoyt, DB.

by Bosworth, S. (ed.) | Hoyt, DB | Hutt, AE. (ed.).

Edition: 3rdPublisher: New York John Wiley & Sons 1995Availability: Items available for loan: Strathmore University (Main Library) [Call number: HF5548.37.C64 1995] (3).
Computer security within organizations Warman, AR.

by Warman, AR.

Publisher: London, UK Macmillan Publising Co. Inc 1993Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.9.A25W37 1993] (1).
Computers, ethics, and society / edited by M. David Ermann, Mary B. Williams, Michele S. Shauf.

by Ermann, M. David | Williams, Mary B | Shauf, Michele S.

Edition: 2nd ed.Publisher: New York : Oxford University Press, 1997Online access: Publisher description | Table of contents only Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.9.C66C6575 1997] (3).
Cryptography and network security Behrouz A. Forouzan.

by Forouzan, Behrouz.

Edition: International ed.Publisher: Boston: McGraw-Hill Companies, 2008Availability: Items available for loan: Strathmore University (Main Library) [Call number: TK5105.59.F67 2008] (10).
Cryptography and network security Principles and pratices

Edition: 4th edPublisher: Upper Saddle River, NJ Pearson Prentice Hall 2006Availability: Items available for loan: Strathmore University (Main Library) [Call number: TK5105.59.S713 2006] (10).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 4th ed.Publisher: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006Availability: Items available for loan: Strathmore University (Main Library) [Call number: TK5105.59.S713 2006] (6).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Publisher: New Delhi, India Prentice Hall-of India 2003Availability: No items available In transit (1).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Publisher: Upper Saddle River, New Jersey Prentice Hall/Pearson Education International 2003Availability: Items available for loan: Strathmore University (Main Library) [Call number: TK5105.59.S713 2003] (2).
Database systems : a practical approach to design, implementation, and management / Thomas M. Connolly, Carolyn E. Begg.

by Connolly, Thomas M | Begg, Carolyn E.

Edition: 5th ed.Publisher: Boston ; London : Addison-Wesley, c2010Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.9.D26C66 2010] (4). In transit (1).
Datatheft : computer fraud, industrial espionage, and information crime / Hugo Cornwall.

by Cornwall, Hugo.

Publisher: London : Heinemann, 1987Availability: Items available for loan: Strathmore University (Main Library) [Call number: HV6773.C67 1987] (1).
Distributed systems Concepts and design Coulouris, George., Dollimore, Jean. and Kinderberg, Tim.

by Coulouris, George | Jean Dollimore | Tim Kinderberg.

Edition: 4thPublisher: Harlow, UK Addison-Wesley Publishing Company 2005Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.9.D5C68 2005] (15).
Entrepreneurship : strategies and resources / Dollinger, MJ.

by Dollinger, MJ.

Edition: 3rd edPublisher: Upper Saddle River, New Jersey Prentice Hall 2003Availability: Items available for loan: Strathmore University (Main Library) [Call number: HD62.5.D65 2003] (5). Checked out (1). In transit (1).
Entrepreneurship / Robert D. Hisrich, Michael P. Peters, Dean A. Shepherd.

by Hisrich, Robert D | Peters, Michael P | Shepherd, Dean A.

Edition: 9th ed.Publisher: New York, NY : McGraw-Hill/Irwin, c2013Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Strathmore University (Main Library) [Call number: HD62.5.H577 2013] (5).
Entrepreneurship / Robert D. Hisrich, Michael P. Peters, Dean A. Shepherd.

by Hisrich, Robert D | Peters, Michael P | Shepherd, Dean A.

Edition: African ed.Publisher: New York : McGraw-Hill/Irwin, c2009Availability: Items available for loan: Strathmore University (Main Library) [Call number: HD62.5.H577 2009] (21). In transit (1).
Entrepreneurship / Robert D. Hisrich, Michael P. Peters, Dean A. Shepherd.

by Hisrich, Robert D | Peters, Michael P | Shepherd, Dean A.

Edition: 7th ed.Publisher: Boston : McGraw-Hill/Irwin, c2008Online access: Table of contents only | Publisher description Availability: Items available for loan: Strathmore University (Main Library) [Call number: HD62.5.H577 2008] (19).
Entrepreneurship Theory and Practice : a Kenyan Perspective / Henry M. Bwisa

by Henry, Bwisa M.

Publisher: Nairobi,Kenya JKF 2011Availability: Items available for loan: Strathmore University (Main Library) [Call number: HB615.B85 2011] (5).
Exploting software: how to break code Hoglund, G., McGraw, G.

by Hoglund, G., McGraw, G.

Publisher: Boston Addison-Wesley 2004Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.9.A25H635 2004] (5).
Firewalls and internet security Cheswick, WR. and Bellovin, SM.

by Cheswick, WR | Bellovin, SM.

Publisher: Reading, Massachusetts Addison-Wesley Publishers 1994Availability: No items available Withdrawn (1).
Firewalls and internet security repelling the wily hacker Cheswick, WR. and Bellovin, SM.

by Cheswick, WR | Bellovin, SM.

Publisher: Massachusetts Addison-Wesley 1994Online access: Click here to access online Availability: Items available for loan: Strathmore University (Main Library) [Call number: TK5105.875.157C44 1994] (1).
Fundamentals of computer security technology Amoroso, E.

by Amoroso, E.

Publisher: New Jersey Prentice Hall 1994Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.9.A25A46 1994] (6).
Fundamentals of database systems Elmasri, R. and Navathe, SB.

by Elmasri, R | Navathe, SB.

Edition: 4thPublisher: Boston, Massachusetts Pearson/Addison Wesley 2004Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.9.D3E57 2004] (28). Checked out (1).
Fundamentals of database systems / Ramez Elmasri, Shamkant B. Navathe.

by Elmasri, Ramez | Navathe, Sham.

Edition: 5th ed.Publisher: Boston : Pearson/Addison Wesley, c2007Online access: Table of contents only Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.9.D3E57 2007] (1).
Hacking exposed network security secrets and solutions

by Kurtz, S | McClure, S | Scambray, J.

Edition: 4th.Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.9.A25 2003] (1).
Information security policies and procedures A practitioner's guide Peltier, TR.

by Peltier, TR.

Edition: 2ndPublisher: Boca Raton, Florida Auerbach Publications 2004Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.9.A25 P428 2004] (1).
Internet security : a jumpstart for systems administrators and IT managers / Tim Speed, Juanita Ellis.

by Speed, Tim | Ellis, Juanita.

Publisher: Amsterdam ; Boston : Digital Press, c2003Online access: Publisher description Table of contents Availability: Items available for loan: Strathmore University (Main Library) [Call number: TK5105.59.S64 2003] (1).
Introduction to Java programming : comprehensive version / Y. Daniel Liang.

by Liang, Y. Daniel.

Edition: 9th ed.Publisher: Upper Saddle River, NJ : Pearson Prentice Hall, c2013Other title: Java programming.Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.73.J38 L52 2013] (3).
LAN disaster prevention and recovery / Patrick H. Corrigan.

by Corrigan, Patrick H.

Publisher: Englewood Cliffs, N.J. : PTR Prentice Hall, c1994Availability: No items available Withdrawn (1).
Linux security toolkit Bandel, D.

by Bandel, D.

Publisher: Foster City, California M&T Books an imprint of IDG Books Worldwide, Inc 2000Online access: Click here to access online Availability: (1)
Linux system security an administrator's guide to open source security tools Mann, S. and Mitchell E.

by Mann, S | Mitchell E.

Publisher: Upper Saddle River, New Jersey Prentice Hall PTR 2000Availability: No items available
Network security How to plan for it and how to achieve it Baker, RH.

by Baker, RH.

Publisher: New York McGraw-Hill, Inc. 1995Availability: Items available for loan: Strathmore University (Anjarwalla & Khanna Library) [Call number: KT5105.5.B337 1995] (1).
Network security : a practical approach / Jan L. Harrington.

by Harrington, Jan L.

Publisher: Amsterdam ; Boston : Elsevier : Morgan Kaufmann Publishers, c2005Online access: Publisher description | Table of contents only Availability: Items available for loan: Strathmore University (Main Library) [Call number: TK5105.59.H357 2005] (5).
Network security essentials : applications and standards / William Stallings.

by Stallings, William.

Edition: 3rd ed.Publisher: Upper Saddle River, NJ : Pearson Education, c2007Online access: Table of contents only Availability: Items available for loan: Strathmore University (Main Library) [Call number: TK5105.59.S725 2007] (10).
Practical research : planning and design.

by Leedy, Paul D | Ormrod, Jeanne Ellis.

Edition: 8th ed. / Paul D. Leedy and Jeanne Ellis Ormrod.Publisher: Upper Saddle River, N.J. : Prentice Hall, c2005Availability: Items available for loan: Strathmore University (Main Library) [Call number: Q180.55.M4L43 2005] (5).
Principles and practice of information security : protecting computers from hackers and lawyers Volonino, L. and Robinson, SR.

by Volonino, L | Robinson, SR.

Publisher: Upper Saddle River, NJ Pearson/Prentice Hall 2004Availability: Items available for loan: Strathmore University (Main Library) [Call number: TK5105.59.V65 2004] (2).
Research design / qualitative, quantitative and mixed methods approaches Creswell, JW.

by Creswell, JW.

Edition: 2ndPublisher: California Sage Publications, Inc. 2002Availability: Items available for loan: Strathmore University (Main Library) [Call number: H62.C6963 2002] (19). Checked out (5).
Research methodology : a step-by-step guide for beginners / Ranjit Kumar.

by Kumar, Ranjit.

Edition: 2nd ed.Publisher: London ; Thousand Oaks, Calif. : SAGE, 2005Online access: Publisher description | Table of contents only Availability: Items available for loan: Strathmore University (Main Library) [Call number: H62.K84 2005] (20).
Research methods for business students / Mark Saunders

by Saunders, Mark.

Edition: 5th ed.Publisher: New York Prentice Hall 2009Availability: Items available for loan: Strathmore University (Main Library) [Call number: HD30.4.S28 2009] (1).
Research methods for business students / Mark Saunders, Philip Lewis, Adrian Thornhill.

by Saunders, M. N. K | Lewis, Philip, 1945- | Thornhill, Adrian.

Edition: 4th ed.Publisher: Harlow, England ; New York : Financial Times/Prentice Hall, 2007Online access: Table of contents only Availability: Items available for loan: Strathmore University (Main Library) [Call number: HD30.4.S28 2007] (1).
Security in computing Pfleeger, CP. and Pfleeger, SL.

by Pfleeger, CP | Pfleeger, SL.

Edition: 3rdPublisher: Upper Saddle River, New Jersey Prentice Hall 2003Availability: No items available Withdrawn (4).
Security in computing Pfleeger, CP. and Pfleeger, SL.

by Pfleeger, CP | Pfleeger, SL.

Edition: 3rdPublisher: Upper Saddle River, New Jersey Prentice Hall 2007Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.9.A25 P45 2007] (5).
Small business, entrepreneurship and enterprise development / Beaver M.

by Beaver, Graham.

Publisher: Harlow, England Pearson Education Inc. 2002Availability: Items available for loan: Strathmore University (Main Library) [Call number: HD62.7B43 2002] (4).
The art of intrusion: the real stories behind the exploits of hackers, intruders and deceivers Mitnick, KD. and Simon, Wl.

by Mitnick, KD. Simon, Wl | Simon, Wl.

Publisher: Indianapolis, Indiana John Wiley and Sons, Inc 2005Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.9.A25.M587 2005] (5).
The art of protecting mobile data Muthoga Kioni

by Kioni, Muthoga.

Publisher: Nairobi The Standard Group Wednesday, February 11, 2009Availability: No items available
The Art of total living Silvano Borruso

by Borruso, S.

Publisher: Nairobi Paulines Publications Africa 1996Availability: Items available for loan: Strathmore University (Main Library) [Call number: BJ1518.B67 1996] (17). Checked out (1).
The CERT guide to system and network security practices Allen, JH.

by Allen, JH.

Publisher: Boston, Massachusetts Addison-Wesley 2001Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.9.A25 A454 2001] (1).
The Computer virus protection handbook Haynes, C.

by Haynes, C.

Publisher: New Delhi, India BPB Publications 1990Availability: No items available Withdrawn (1).
Thinking in Java The definitive introduction to object-oriented programming in the language of the world wide web Bruce Eckel

by Eckel,Bruce.

Edition: 4th edPublisher: New Jersy Prentice Hall c2006Availability: Items available for loan: Strathmore University (Main Library) [Call number: QA76.73.J38E25 2006] (5).
Using encryption to enhance security Muthoga kioni

by Kioni, Muthoga.

Publisher: Nairobi The Standard Group Wednesday, January 21 2009Availability: No items available
Web security sourcebook / Aviel D. Rubin, Daniel Greer, Marcus J. Ranum.

by Rubin, Aviel D | Geer, Daniel | Ranum, Marcus J.

Publisher: New York : Wiley Computer Pub., c1997Online access: Contributor biographical information | Publisher description | Table of Contents Availability: http://www.loc.gov/catdir/bios/wiley042/97016374.html (3) Withdrawn (1).
Log in to create new lists.

© Strathmore University Library Madaraka Estate Ole, Sangale Road P. O. Box 59857 00200 City Square Nairobi Kenya
Tel.: (+254) (0)703 034000/(0)703 034200/(0)703 034300 Fax.: (+254) (0)20-607498