Your search returned 12 results.

Not what you expected? Check for suggestions
1.
Security Of Computer Based Information Systems

by Lane V.

Edition: 1Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: London Macmillan 1985Availability: Items available for loan: TUM Main CampusCall number: QA 76.9.A25L36 1985 (1).

2.
Information Security For Global Information .....

by Jan H.P. Eloff.

Edition: 0Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston Kluwer 2000Availability: Items available for loan: TUM Main CampusCall number: QA 76.9.A25 (1).

3.
Secure Electronic Commerce ; Building The Infrastructure For Digital Signatures And Encryption

by Baum, Michael S.

Edition: 0Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New Jersey Prentice Hall 2001Availability: Items available for loan: TUM Main CampusCall number: QA 76.9.A25F655 2000 (1).

4.
Information Systems Security

by .

Edition: 0Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Usa John Wiley & Sons 2007Availability: Items available for loan: TUM Main CampusCall number: QA 76.9.A25D525 (1).

5.
Secrets & Lies Digital Security in a Networked World

by Schneier Bruce.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Danvers MA John WIley & Sons 2000Availability: Items available for loan: TUM Main CampusCall number: QA 76.9 .A25 2000 (1).

6.
Designing network security A Practical guide to creating a secure network infrastructure

by Kaeo, Merike.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, Ind. : Macmillan Technical Pub., c1999Availability: Items available for loan: TUM Main CampusCall number: TK 5105.59.K34 1999 (1).

7.
Firewalls : jumpstart for network and systems administrators

by Vacca, John R.".

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Amsterdam ; Boston : Elsevier Digital," ; c2005Availability: Items available for loan: TUM Main CampusCall number: TK 5105.59 .V32 2005 (2).

8.
Open source security tools : practical applications for security / Tony Howlett.

by Howlett, Tony.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Prentice Hall, c2005Online access: Table of contents Availability: Items available for loan: TUM Main CampusCall number: QA 76.9 .A25 H685 2004 (2).

9.
Digital fortress / Dan Brown.

by Brown, Dan, 1964-.

Material type: Text Text; Format: print ; Literary form: Fiction Publisher: New York : St. Martin's Paperbacks, 2004Availability: Items available for loan: TUM Main CampusCall number: PS 3552.R685434 D54 1998 (1).

10.
Essential cybersecurity science : build, test, and evaluate secure systems / Josiah Dykstra.

by Dykstra, Josiah [author.].

Edition: First edition.Material type: Text Text; Format: print ; Literary form: Not fiction Availability: Items available for loan: TUM Main CampusCall number: QA 76.9.A25 D95 2016 (1).

11.
IT governance : an international guide to data security and ISO 27001/ISO 27002 / Alan Calder, Steve Watkins.

by Calder, Alan, 1957- [author.] | Watkins, Steve, 1970- [author.].

Edition: Seventh edition.Material type: Text Text; Format: print ; Literary form: Not fiction Other title: Information technology governance.Availability: Items available for loan: TUM Main CampusCall number: QA 76.9.A25 C342 2020 (1).

12.
Cyber Security

by Goyal, Krishan Kumar Dr | Garg, Amit Prof.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New Delhi, India University Science Press 2019Availability: Items available for loan: TUM Main CampusCall number: QA 76.9 .G693 2019 (1).

Technical University of Mombasa
Tom Mboya Street, Tudor 90420-80100 , Mombasa Kenya
Tel: (254)41-2492222/3 Fax: 2490571