Your search returned 17 results.

Sort
Results
1.
Image from Google Jackets
COMPUTER SECURITY BASICS by
Material type: Text Text
Publication details: BEIJING, O'REILLY & ASSOCIATES, INC, 1991
Availability: Items available for loan: Kisii University Library (2)Call number: QA 76.9 .A25 1991, ...

2.
Image from Google Jackets
DIGITAL WATERMARKING AND STEGANOGRAPHY by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: AMSTERDAM ELSEVIER 2008
Availability: Items available for loan: Kisii University Library (4)Call number: QA 76.9.A25 D5 2OOO8 , ...

3.
Image from Google Jackets
DIGITAL WATERMARKING AND STEGANOGRAPHY by
Edition: SECOND EDITION
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: AMSTERDAM ELSEVIER 2008
Availability: Items available for loan: Kisii University Library (1)Call number: QA 76.9 .A25 .D54 2008.

4.
Image from Google Jackets
PC MAGAZINE FIGHTING SPYWARE VIRUSES AND MALWARE by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: CANADA WILEY 2005
Availability: Items available for loan: Kisii University Library (1)Call number: QA 141.A85 1984.

5.
Image from Google Jackets
THE LAW AND ECONOMICS OF CYBER SECURITY by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: ROTTERDAM ERASMUS UNIVERSITY ROTTERDAM 2018
Availability: Items available for loan: Kisii University Library (1)Call number: K 564 .C6 N54 2018.

6.
Image from Google Jackets
THE COMPLETE GUIDE TO CYBERSECURITY RISKS AND CONTROLS by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: LONDON CRC PRESS 2016
Availability: Items available for loan: Kisii University Library (2)Call number: QA76.9 .A25 K64 2016, ...

7.
Image from Google Jackets
COMPUTER SECURITY by
Edition: 3RD ED
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: WEST SUSSEX JOHN WILEY & SONS LTD 2011
Availability: Items available for loan: Kisii University Library (2)Call number: QA76.9 .A25 G65 2011, ...

8.
Image from Google Jackets
COMPUTER AND INFORMATION SECURITY by
Edition: 3RD ED
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: CAMBRIDGE ELSEVIER INC 2017
Availability: Items available for loan: Kisii University Library (2)Call number: QA76.9 .A25 C66 2017, ...

9.
Image from Google Jackets
MOBILE SECURITY AND PRIVACY ADVANCES, CHALLENGES AND FUTURE RESEARCH DIRECTIONS by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: AMSTERDAM ELSEVIER INC 2017
Availability: Items available for loan: Kisii University Library (2)Call number: QA76.9 .A25 M63 2017, ...

10.
Image from Google Jackets
ECONOMICS OF INFORMATION SECURITY AND PRIVACY by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: NEW YORK SPRINGER 2010
Availability: Items available for loan: Kisii University Library (2)Call number: TK5105.59 .E56 2010, ...

11.
Image from Google Jackets
HARDWARE SECURITY DESIGN, THREATS AND SAFEGUARDS by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: BOCA RATON CRC PRESS 2015
Availability: Items available for loan: Kisii University Library (2)Call number: QA76.9 .A25 M85 2015, ...

12.
Image from Google Jackets
PROFESSIONAL RED TEAMING CONDUCTING SUCCESSFUL CYBERSECURITY ENGAGEMENTS by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: NEW YORK APRESS 2019
Availability: Items available for loan: Kisii University Library (2)Call number: QA76.9 .A25 O25 2019, ...

13.
Image from Google Jackets
CORE SOFTWARE SECURITY:SECURITY AT THE SOURCE by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: LONDON, CRC PRESSTAYLOR & FRANCIS GROUP, 2014
Availability: Items available for loan: Kisii University Library (2)Call number: QA 76.9 .R 36 2014, ...

14.
Image from Google Jackets
AUDITING IT INFRASTRUCTURES FOR COMPLIANCE by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: BURLINGTON, MA JONES & BARTLETT LEARNING 2016
Availability: Items available for loan: Kisii University Library (2)Call number: QA76.9 .W45 2016, ...

15.
Image from Google Jackets
BUILDING INTERNET FIREWALLS: INTERNET AND WEB SECURITY by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: BEIJING ; CAMBRIDGE, MASS. O'REILLY 2000
Availability: Items available for loan: Kisii University Library (2)Call number: TK 5105.59 .Z865 2000, ...

16.
Image from Google Jackets
HACKER TECHNIQUES, TOOLS, AND INCIDENT HANDLING by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: BURLINGTON, MA JONES & BARTLETT LEARNING 2014
Availability: Items available for loan: Kisii University Library (2)Call number: TK 5105.59 .O75 2014, ...

17.
Image from Google Jackets
CUBERWARFARE: INFORMATION OPERATIONS IN A CONNECTED WORLD by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: BURLINGTON, MA JONES & BARTLETT LEARNING 2015
Availability: Items available for loan: Kisii University Library (2)Call number: QA 76.9 .A25 C493 2015, ...