UNIVERSITY LIBRARY CATALOGUE

Refine your search

Your search returned 274 results.

Sort
Results
161.
Amazon cover image
Image from Amazon.com
Cloud computing protected / by John Rhoton ; with contributions f rom: Jan De Clercq, David Graves. by
Material type: Text Text
Publication details: Tunbridge Wells, Kent : Recursive Press, 2013
Availability: No items available.

162.
Amazon cover image
Image from Amazon.com
Wireless security essentials : defending mobile systems from data piracy / Russell Dean Vines. by
Material type: Text Text
Publication details: Indianapolis : Wiley, c2002
Availability: No items available.

163.
Amazon cover image
Image from Amazon.com
Security+ guide to network security fundamentals / Mark Ciampa. by
Edition: 3rd Ed.
Material type: Text Text
Publication details: Clifton Park, N.Y : Delmar Learning, 2008
Availability: No items available.

164.
Amazon cover image
Image from Amazon.com
165.
Amazon cover image
Image from Amazon.com
Cryptography and network security : principles and practice / William Stallings. by
Edition: 5th ed.
Material type: Text Text
Publication details: Boston : Prentice Hall, c2011
Availability: No items available.

166.
Amazon cover image
Image from Amazon.com
Network security essentials : applications and standards / Wil liam Stallings. by
Edition: 4th ed.
Material type: Text Text
Publication details: Boston : Pearson Education, Inc. c2011
Availability: No items available.

167.
Amazon cover image
Image from Amazon.com
Fundamentals of network security / John E. Canavan. by Series: Artech House telecommunications library
Material type: Text Text
Publication details: Boston : Artech House, c2001
Availability: No items available.

168.
Amazon cover image
Image from Amazon.com
Hacking exposed : web applications : web application security sec rets and solutions / Joel Scambray, Vincent Liu, Caleb Sima. by
Edition: 3rd ed.
Material type: Text Text
Publication details: San Francisco : McGraw-Hill Companies, 2010
Availability: No items available.

169.
Amazon cover image
Image from Amazon.com
Hacking exposed 6 : network security secrets & solutions / Stu art McClure, Joel Scambray, George Kurtz. by
Edition: 10th anniversary ed.
Material type: Text Text
Publication details: New York : McGraw-Hill, c2009
Other title:
  • Hacking 6 exposed
  • Hacking exposed six
Availability: No items available.

170.
Amazon cover image
Image from Amazon.com
Computer security: / principles and practice William Stallings , Lawrie Brown by
Edition: 4th ed.
Material type: Text Text
Publication details: New York : Pearson , 2017
Availability: No items available.

171.
Amazon cover image
Image from Amazon.com
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. by
Edition: 2nd ed.
Material type: Text Text
Publication details: New York : Wiley, c1996
Availability: No items available.

172.
Amazon cover image
Image from Amazon.com
SSL and TLS : designing and building secure systems / Eric Res corla. by
Material type: Text Text
Publication details: Boston : Addison-Wesley, c2001
Availability: No items available.

173.
Amazon cover image
Image from Amazon.com
Computer security handbook / edited by Seymour Bosworth, M.E. Kab ay. by
Edition: 4th ed.
Material type: Text Text
Publication details: New York : John Wiley & Sons, c2002
Availability: No items available.

174.
Amazon cover image
Image from Amazon.com
Web security & commerce / Simson Garfinkel with Gene Spafford. by Series: A Nutshell handbook
Edition: 1st ed.
Material type: Text Text
Publication details: Sebastopol : O'Reilly, c1997
Other title:
  • Web security and commerce
Availability: No items available.

175.
Amazon cover image
Image from Amazon.com
Enterprise security : the manager's defense guide / David Leon Clark. by Series: Addison-Wesley information technology series
Material type: Text Text
Publication details: Boston : Addison-Wesley, c2003
Availability: No items available.

176.
Improving the security of mobile money transactions / Kiconco Edw in by
Material type: Text Text
Publication details: Kampala, 2014
Dissertation note: Unpublished thesis (M.Sc., Comp.Sc.) - Makerere University, 2014
Availability: No items available.

177.
Security and communication networks.
Material type: Continuing resource Continuing resource
Publication details: Chichester, West Sussex, England : John Wiley & Sons, Ltd.
Other title:
  • Security & communication networks
Availability: No items available.

178.
Amazon cover image
Image from Amazon.com
Nuclear security [Electronic resource] ; global directions for the future / produced by the IAEA. by
Material type: Computer file Computer file; Format: electronic
Publication details: Vienna : International Atomic Energy Agency, 2005
Availability: No items available.

179.
Effective nuclear regulatory systems (Electronic resource) : f acing safety and security challenges / organised by International At omic Energy Agency. by Series: Proceedings series
Material type: Computer file Computer file; Format: electronic
Publication details: Vienna : International Atomic Energy Agency 2006
Other title:
  • Proceedings of an International Conference on Effective Nuclear Regu latory Systems.
Availability: No items available.

180.
An enhanced genetic algorithm approach to detect cross site scriptin g attacks / Katumba Elvis Hues by
Material type: Text Text
Publication details: Kampala, 2015
Dissertation note: Unpublished thesis (M.Sc., Comp. Sc.) - Makerere University, 2015
Availability: No items available.