Your search returned 44 results.

Not what you expected? Check for suggestions
1.
Security Of Computer Based Information Systems

by Lane V.

Edition: 1Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: London Macmillan 1985Availability: Items available for loan: TUM Main CampusCall number: QA 76.9.A25L36 1985 (1).

2.
Information Security For Global Information .....

by Jan H.P. Eloff.

Edition: 0Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston Kluwer 2000Availability: Items available for loan: TUM Main CampusCall number: QA 76.9.A25 (1).

3.
Secure Electronic Commerce ; Building The Infrastructure For Digital Signatures And Encryption

by Baum, Michael S.

Edition: 0Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New Jersey Prentice Hall 2001Availability: Items available for loan: TUM Main CampusCall number: QA 76.9.A25F655 2000 (1).

4.
Information Systems Security

by .

Edition: 0Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Usa John Wiley & Sons 2007Availability: Items available for loan: TUM Main CampusCall number: QA 76.9.A25D525 (1).

5.
Secrets & Lies Digital Security in a Networked World

by Schneier Bruce.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Danvers MA John WIley & Sons 2000Availability: Items available for loan: TUM Main CampusCall number: QA 76.9 .A25 2000 (1).

6.
Designing network security A Practical guide to creating a secure network infrastructure

by Kaeo, Merike.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, Ind. : Macmillan Technical Pub., c1999Availability: Items available for loan: TUM Main CampusCall number: TK 5105.59.K34 1999 (1).

7.
Firewalls : jumpstart for network and systems administrators

by Vacca, John R.".

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Amsterdam ; Boston : Elsevier Digital," ; c2005Availability: Items available for loan: TUM Main CampusCall number: TK 5105.59 .V32 2005 (2).

8.
Open source security tools : practical applications for security / Tony Howlett.

by Howlett, Tony.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Prentice Hall, c2005Online access: Table of contents Availability: Items available for loan: TUM Main CampusCall number: QA 76.9 .A25 H685 2004 (2).

9.
Digital fortress / Dan Brown.

by Brown, Dan, 1964-.

Material type: Text Text; Format: print ; Literary form: Fiction Publisher: New York : St. Martin's Paperbacks, 2004Availability: Items available for loan: TUM Main CampusCall number: PS 3552.R685434 D54 1998 (1).

10.
Cyber defense mechanisms [electronic resource] : security, privacy, and challenges / edited by Gautam Kumar, Dinesh Kumar Saini, and Nguyen Ha Huy Cuong.

by Kumar, Gautam, 1990- | Saini, Dinesh Kumar, 1974- | Cuong, Nguyen Ha Huy.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton, FL : CRC Press, 2021Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available :

11.
Digital forensics explained / Greg Gogolin.

by Gogolin, Greg [editor.].

Edition: 2nd.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2021Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available :

12.
Information security and optimization / edited by Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta.

by Tanwar, Rohit [editor.] | Choudhury, Tanupriya [editor.] | Zamani, Mazdak [editor.] | Gupta, Sunil, 1979- [editor.].

Edition: First edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : C&H\CRC Press, 2021Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available :

13.
Cyber-security threats, actors, and dynamic mitigation / edited by Nicholas Kolokotronis and Stavros Shiaeles.

by Kolokotronis, Nicholas [editor.] | Shiaeles, Stavros [editor.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2021Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available :

14.
Secret history the story of cryptology / Craig P. Bauer.

by Bauer, Craig P [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Boca Raton : Chapman & Hall/CRC, 2021Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available :

15.
Behavioral cybersecurity : fundamental principles and applications of personality psychology / Wayne Patterson, Cynthia E. Winston-Proctor.

by Patterson, Wayne, 1945- [author.] | Winston-Proctor, Cynthia E [author.].

Edition: 1st.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2020Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available :

16.
Attribute-Based Encryption and Access Control [electronic resource] / Dijiang Huang, Qiuxiang Dong, Yan Zhu.

by Huang, Dijiang | Dong, Qiuxiang | Zhu, Yan (Professor of computer security).

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press LLC, 2020Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available :

17.
The evolution of business in the cyber age : digital transformation, threats, and security / edited by Divya Gupta Chowdhry, Rahul Verma, Manisha Mathur.

by Chowdhry, Divya Gupta [editor.] | Verma, Rahul, 1989- [editor.] | Mathur, Manisha [editor.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Oakville, ON, Canada ; Palm Bay, Florida, USA : Apple Academic Press, 2020Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available :

18.
Cyber arms : security in cyberspace / Stanislav Abaimov, Cyber Security and Electronic Engineering, University of Rome, Tor Vergata Rome, Italy, Maurizio Martellini, Department of Science and High Technology, University of Uninsubria Como, Italy.

by Abaimov, Stanislav, 1989- [author.] | Martellini, M. (Maurizio) [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton, FL : CRC Press, Taylor & Francis Group, [2020]Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available :

19.
CYBERSECURITY LESSONS FROM COVID-19.

by Slade, Robert.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: [Place of publication not identified] : CRC PRESS, 2021Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available :

20.
Cybersecurity for everyone / David B. Skillicorn.

by Skillicorn, David B [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2021Copyright date: ©2021Online access: Taylor & Francis | OCLC metadata license agreement Availability: No items available :

Technical University of Mombasa
Tom Mboya Street, Tudor 90420-80100 , Mombasa Kenya
Tel: (254)41-2492222/3 Fax: 2490571