Your search returned 27 results.

Not what you expected? Check for suggestions
1.
The Stephen Cobb Complete Book Of Pc And Lan Security

by Cobb Stephen.

Edition: 1Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York Windcrest 1990Availability: Items available for loan: TUM Main CampusCall number: TK 5105 .7. C62 1992 (1).

2.
Internet Security Dictionary

by .

Edition: 0Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York Springer-Verlag 2002Availability: Items available for loan: TUM Main CampusCall number: TK 5105.59 (1).

3.
Hacking Exposed: Network Security Secrets And Solutions

by Scambray Joel.

Edition: 0Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Availability: Items available for loan: TUM Main CampusCall number: TK 5105.59.M48 1999 (1).

4.
Secrets & Lies Digital Security in a Networked World

by Schneier Bruce.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Danvers MA John WIley & Sons 2000Availability: Items available for loan: TUM Main CampusCall number: QA 76.9 .A25 2000 (1).

5.
Designing network security A Practical guide to creating a secure network infrastructure

by Kaeo, Merike.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, Ind. : Macmillan Technical Pub., c1999Availability: Items available for loan: TUM Main CampusCall number: TK 5105.59.K34 1999 (1).

6.
Network security : a practical approach / Jan L. Harrington.

by Harrington, Jan L.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Amsterdam ; Boston : Elsevier : Morgan Kaufmann Publishers, c2005Online access: Publisher description | Table of contents only Availability: Items available for loan: TUM Main CampusCall number: TK 5105 .59 H357 2005 (2).

7.
Open source security tools : practical applications for security / Tony Howlett.

by Howlett, Tony.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Prentice Hall, c2005Online access: Table of contents Availability: Items available for loan: TUM Main CampusCall number: QA 76.9 .A25 H685 2004 (2).

8.
MCSE Windows 2000 security design / Richard Alan McMahon Sr., Glen R. Bicking.

by McMahon, Richard Alan | Bicking, Glen.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Scottsdale, AZ: Coriolis Group Books, 2000Availability: Items available for loan: TUM Main CampusCall number: QA 76.3.M32565 2000 (1).

9.
Cyber defense mechanisms [electronic resource] : security, privacy, and challenges / edited by Gautam Kumar, Dinesh Kumar Saini, and Nguyen Ha Huy Cuong.

by Kumar, Gautam, 1990- | Saini, Dinesh Kumar, 1974- | Cuong, Nguyen Ha Huy.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton, FL : CRC Press, 2021Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available :

10.
Distributed denial of service attacks : real-world detection and mitigation / Richard R. Brooks, İlker Özçelik.

by Brooks, R. R. (Richard R.) [author.] | Özçelik, İlker [author.].

Edition: First edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton, FL : Chapman and Hall/CRC, 2020Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available :

11.
Managing security services in heterogenous networks confidentiality, integrity, availability, authentication, and access control / N. Jeyanthi, Kun Ma, Thinagaran Perumal, N. Thandeeswaran.

by Jeyanthi, N, 1977- [author.] | Ma, Kun (Computer scientist) [author.] | Perumal, Thinagaran [author.] | Thandeeswaran, N [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Boca Raton : CRC Press, 2021Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available :

12.
CyRM? mastering the management of cybersecurity / David Martin.

by Martin, David X [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Boca Raton : CRC Press, 2021Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available :

13.
Enterprise level security 2 [electronic resource] : advanced topics in an uncertain world / Dr. Kevin E. Foltz and Dr. William R. Simpson, Institute for Defense Analysis.

by Foltz, Kevin E [author.] | Simpson, William Randolph, 1946- [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2020Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available :

14.
Attribute-Based Encryption and Access Control [electronic resource] / Dijiang Huang, Qiuxiang Dong, Yan Zhu.

by Huang, Dijiang | Dong, Qiuxiang | Zhu, Yan (Professor of computer security).

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press LLC, 2020Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available :

15.
The evolution of business in the cyber age : digital transformation, threats, and security / edited by Divya Gupta Chowdhry, Rahul Verma, Manisha Mathur.

by Chowdhry, Divya Gupta [editor.] | Verma, Rahul, 1989- [editor.] | Mathur, Manisha [editor.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Oakville, ON, Canada ; Palm Bay, Florida, USA : Apple Academic Press, 2020Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available :

16.
Cybersecurity ethics : an introduction / Mary Manjikian.

by Manjikian, Mary [author.].

Material type: Text Text; Literary form: Not fiction Publisher: Abingdon, Oxon ; New York, NY : Routledge, 2018Online access: Click here to view. Availability: No items available :

17.
Cloud computing security [electronic resource] : foundations and challenges / edited by John R. Vacca.

by Vacca, John R [editor.].

Edition: Second edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton, FL : CRC Press, Taylor & Francis Group, 2021Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available :

18.
Essential cybersecurity science : build, test, and evaluate secure systems / Josiah Dykstra.

by Dykstra, Josiah [author.].

Edition: First edition.Material type: Text Text; Format: print ; Literary form: Not fiction Availability: Items available for loan: TUM Main CampusCall number: QA 76.9.A25 D95 2016 (1).

19.
IT governance : an international guide to data security and ISO 27001/ISO 27002 / Alan Calder, Steve Watkins.

by Calder, Alan, 1957- [author.] | Watkins, Steve, 1970- [author.].

Edition: Seventh edition.Material type: Text Text; Format: print ; Literary form: Not fiction Other title: Information technology governance.Availability: Items available for loan: TUM Main CampusCall number: QA 76.9.A25 C342 2020 (1).

20.
Understanding cyber risk [electronic resource] / Daniel Dobrygowski.

by Dobrygowski, Daniel [spk].

Material type: Film Film; Format: electronic available online remote; Type of visual material: videorecording Publisher: London : Henry Stewart Talks, 2021Online access: Click here to access online Availability: No items available :

Technical University of Mombasa
Tom Mboya Street, Tudor 90420-80100 , Mombasa Kenya
Tel: (254)41-2492222/3 Fax: 2490571