FIT - CRYPTOGRAPHY AND NETWORK SECURITY

This list contains 43 titles

CISM practice question database v9 Information Systems Audit and Control Association by
Publication details: Rolling Meadows, IL : Information Systems Audit and Control Association
Other title:
  • Certified Information Security Manager review manual
Availability: Items available for loan: Strathmore University (Main Library) (1)Call number: QA76.9.C57 2008.
CISM review manual 2009. by
Publication details: Rolling Meadows, IL : Information Systems Audit and Control Association
Other title:
  • Certified Information Security Manager review manual
Availability: No items available.
Codes and ciphers / Fred B. Wrixon. by
Edition: 1st ed.
Publication details: New York : Prentice Hall, c1992
Availability: Items available for loan: Strathmore University (Main Library) (1)Call number: Z103.3.W75 1992.
Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience, and ROI / Debra S. Herrmann. by
Publication details: Boca Raton : Auerbach Publications, c2007
Online resources:
Availability: Items available for loan: Strathmore University (Main Library) (1)Call number: TK5102.85.H4685 2007.
Computer crime a crimefighter's handbook Icove, D., Seger, K. and VonStorch, W. by
Publication details: Suite A Sebastopol O'Reilly & Associates Incorporation 1995
Availability: Items available for loan: Strathmore University (Main Library) (1)Call number: HV6773.I36 1995.
Computer network security and cyber ethics Kizza, JM. by
Publication details: Jefferson, North Carolina McFarland and Company, Inc, Publishers 2002
Availability: Items available for loan: Strathmore University (Main Library) (1)Call number: TK5105.59.K58 2002.
Computer security : art and science / Matt Bishop. by
Publication details: Boston : Addison-Wesley, 2003
Availability: Items available for loan: Strathmore University (Main Library) (12)Call number: QA76.9.A25 B56 2002, ...
Computer security : a handbook for management / Leonard H. Fine. by
Publication details: London : Heinemann in association with the Irish Management Institute, 1983
Availability: Items available for loan: Strathmore University (Main Library) (1)Call number: QA76.9.A25F53 1983.
Computer security handbook edited by Hutt, AE., Bosworth, S., Hoyt, DB. by
Edition: 3rd
Publication details: New York John Wiley & Sons 1995
Availability: Items available for loan: Strathmore University (Main Library) (3)Call number: HF5548.37.C64 1995, ...
Computer security within organizations Warman, AR. by Series: Macmillan computer science series
Publication details: London, UK Macmillan Publising Co. Inc 1993
Availability: Items available for loan: Strathmore University (Main Library) (1)Call number: QA76.9.A25W37 1993.
Computers, ethics, and society / edited by M. David Ermann, Mary B. Williams, Michele S. Shauf. by
Edition: 2nd ed.
Publication details: New York : Oxford University Press, 1997
Availability: Items available for loan: Strathmore University (Main Library) (3)Call number: QA76.9.C66C6575 1997, ...
Cryptography and network security Principles and pratices
Edition: 4th ed
Publication details: Upper Saddle River, NJ Pearson Prentice Hall 2006
Availability: Items available for loan: Strathmore University (Main Library) (10)Call number: TK5105.59.S713 2006, ...
Cryptography and network security Behrouz A. Forouzan. by
Edition: International ed.
Publication details: Boston: McGraw-Hill Companies, 2008
Availability: Items available for loan: Strathmore University (Main Library) (10)Call number: TK5105.59.F67 2008, ...
Cryptography and network security : principles and practice / William Stallings. by
Publication details: New Delhi, India Prentice Hall-of India 2003
Availability: No items available.
Cryptography and network security : principles and practice / William Stallings. by
Publication details: Upper Saddle River, New Jersey Prentice Hall/Pearson Education International 2003
Availability: Items available for loan: Strathmore University (Main Library) (2)Call number: TK5105.59.S713 2003, ...
Cryptography and network security : principles and practice / William Stallings. by
Edition: 4th ed.
Publication details: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006
Availability: Items available for loan: Strathmore University (Main Library) (6)Call number: TK5105.59.S713 2006, ...
Datatheft : computer fraud, industrial espionage, and information crime / Hugo Cornwall. by
Publication details: London : Heinemann, 1987
Availability: Items available for loan: Strathmore University (Main Library) (1)Call number: HV6773.C67 1987.
Exploting software: how to break code Hoglund, G., McGraw, G. by
Publication details: Boston Addison-Wesley 2004
Availability: Items available for loan: Strathmore University (Main Library) (5)Call number: QA76.9.A25H635 2004, ...
Firewalls and internet security Cheswick, WR. and Bellovin, SM. by Series: Addison-Wesley professional computing series
Publication details: Reading, Massachusetts Addison-Wesley Publishers 1994
Availability: No items available.
Firewalls and internet security repelling the wily hacker Cheswick, WR. and Bellovin, SM. by Series: Addison-Wesley Professional Computing series
Publication details: Massachusetts Addison-Wesley 1994
Online resources:
Availability: Items available for loan: Strathmore University (Main Library) (1)Call number: TK5105.875.157C44 1994.
 <<  <  1  2  3    >>

© Strathmore University Library
Madaraka Estate, Ole Sangale Road | P. O. Box 59857 - 00200 City Square, Nairobi, Kenya
(+254) (0)703 034 000/200/300 | (+254) (0)20-607498