Your search returned 15 results.

Sort
Results
1.
Computer and intrusion forensics / George Mohay ... [et al.]. by Series: Artech House computer security series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Artech House, c2003
Availability: Items available for loan: Kabarak, Main Campus (1)Collection, call number: 005.8.

2.
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger, Devan Shah. by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Delhi : Pearson, 2009
Availability: Items available for loan: Kabarak, Main Campus (1)Collection, call number: QA76.9 .A25P45 2009 c.1. Kabarak, Nakuru City Campus (3)Collection, call number: QA76.9 .A25P45 2009 c.1, ... Not available: Kabarak, Nakuru City Campus: In transit (2).

3.
Disaster recovery planning. : for computers and communication resources / Jon William Toigo. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : John Wiley & Sons, c1996
Availability: Items available for loan: Kabarak, Main Campus (1)Collection, call number: QA76.9 .D348T65.

4.
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger. by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ. : Prentice Hall, 2007
Availability: Items available for loan: Kabarak, Main Campus (2)Collection, call number: QA76.9 .A25P45 2007 c. 1, ... Not available: Kabarak, Main Campus: Checked out (1).

5.
Information security : a manager's guide to thwarting data thieves and hackers / Philip Alexander. by
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London : Praeger Security International, 2008
Availability: Items available for loan: Kabarak, Main Campus (1)Collection, call number: HF5548.37 .A44 2008 c. 1.

6.
Competition law and regulation of technology markets / Kevin Coates. by
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Oxford : O. U. P., 2011
Availability: Items available for loan: Kabarak, Main Campus (1)Collection, call number: KJE6756 .C63 2011 c. 1.

7.
Information technology law / Ian J. Lloyd. by
Edition: 7th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Oxford : OUP, 2014
Availability: Items available for loan: Kabarak, Main Campus (1)Collection, call number: KD667 .C65L56 2014 c. 1.

8.
Information technology law / Ian J. Lloyd. by
Edition: 8th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Oxford : OUP, 2017
Availability: Items available for loan: Kabarak, Main Campus (4)Collection, call number: KD667 .C65L56 2017 c.1, ... Not available: Kabarak, Main Campus: Checked out (1).

9.
Biometrics for user authentication using artificial neural networks keystroke dynamics for user authentication Mais Mohammed Hobi, Sarab Majeed Hameed by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Germany LAP LAMBERT Academic Publishing 2013
Availability: Items available for loan: Kabarak, Main Campus (3)Collection, call number: TK7882 .H63 2013 c. 1, ...

10.
Information Security Policy Development ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 Barry L. Williams by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London CRC Press 2013
Availability: Items available for loan: Kabarak, Main Campus (2)Collection, call number: QA76.9 .W55 2013 c.1, ...

11.
Security in Computing Charles P. Pfleeger by
Edition: 5th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River Prentice Hall 2015
Availability: Items available for loan: Kabarak, Main Campus (2)Collection, call number: QA76.9 .A25P45 2015 c.1, ... Kabarak, Nakuru City Campus (1)Collection, call number: QA76.9 .A25P45 2015 c.1.

12.
Information Privacy Law Daniel J. Solove by
Edition: 6th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York Wolters Kluwer 2018
Availability: Items available for loan: Kabarak, Main Campus (3)Collection, call number: KF1262 .S65 2018 c.1, ...

13.
Legal issues in information security Joanna Lyn Grama by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Jones & Bartlett 2015
Availability: Items available for loan: Kabarak, Main Campus (3)Collection, call number: KF1263 .G76 2015 c.1, ...

14.
Information Technology Law the law and society Andrew Murray by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York O.U.P. 2019
Availability: Items available for loan: Kabarak, Main Campus (3)Collection, call number: KD667 .M87 2019 c.1, ...

15.
Information security Governance a practical development and implementation approach Krag Brotby by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken Wiley 2009
Availability: Items available for loan: Kabarak, Main Campus (2)Collection, call number: HF5548.37 .B76 2009 c.1, ... Kabarak, Nakuru City Campus (1)Collection, call number: HF5548.37 .B76 2009 c.1.

Pages
Designed with assistance from East African Informatics Ltd

Powered by Koha