UNIVERSITY LIBRARY CATALOGUE

Refine your search

Your search returned 274 results.

Sort
Results
261.
A hybrid algorithm to detect Malware and eliminate zero day attacks / Lwomwa Joseph by
Material type: Text Text
Publication details: Kampala, 2014
Dissertation note: Unpublished thesis (M.Sc., Comp. Sc.) - Makerere University, 2014
Availability: Items available for loan: College of Computing and Information Science - COCIS (1)Call number: U 004.19 LO M.

262.
A framework for improving network security in Ad Hoc Mobile Networks / Godfrey Onyait-Omoda by
Material type: Text Text
Publication details: Kampala, 2006
Dissertation note: Unpublished thesis (M.Sc., Comp. Sc.) - Makerere University, 2006
Availability: Items available for loan: College of Computing and Information Science - COCIS (2)Call number: U 005.8 ONY, ...

263.
A hybrid algorithm to detect Malware and eliminate zero day attacks / Lwomwa Joseph by
Material type: Text Text
Publication details: Kampala, 2014
Dissertation note: Unpublished thesis (M.Sc., Comp. Sc.) - Makerere University, 2014
Availability: No items available.

264.
A framework for improving network security in Ad Hoc Mobile Networks / Godfrey Onyait-Omoda by
Material type: Text Text
Publication details: Kampala, 2006
Dissertation note: Unpublished thesis (M.Sc., Comp. Sc.) - Makerere University, 2006
Availability: No items available.

265.
Protocol [electronic resource] : how control exists after dece ntralization / Alexander R. Galloway. by Series: Leonardo | Leonardo (Series) (Cambridge, Mass.) | ACLS Humanities E-Book
Material type: Text Text
Publication details: Cambridge, Mass. : MIT Press, c2004
Other title:
  • How control exists after decentralization
In: ACLS Humanities E-Book URL: http://www.humanitiesebook.org/
Availability: No items available.

266.
A hybrid algorithm to detect Malware and eliminate zero day attacks / Lwomwa Joseph by
Material type: Text Text
Publication details: Kampala, 2014
Dissertation note: Unpublished thesis (M.Sc., Comp. Sc.) - Makerere University, 2014
Availability: No items available.

267.
A framework for improving network security in Ad Hoc Mobile Networks / Godfrey Onyait-Omoda by
Material type: Text Text
Publication details: Kampala, 2006
Dissertation note: Unpublished thesis (M.Sc., Comp. Sc.) - Makerere University, 2006
Availability: No items available.

268.
Protocol [electronic resource] : how control exists after dece ntralization / Alexander R. Galloway. by Series: Leonardo | Leonardo (Series) (Cambridge, Mass.) | ACLS Humanities E-Book
Material type: Text Text
Publication details: Cambridge, Mass. : MIT Press, c2004
Other title:
  • How control exists after decentralization
In: ACLS Humanities E-Book URL: http://www.humanitiesebook.org/
Availability: No items available.

269.
Amazon cover image
Image from Amazon.com
Information assurance handbook : effective computer security and risk management strategies / Corey Schou, Steven Hernandez. by
Material type: Text Text
New York : McGraw-Hill Education, [2015]
Availability: Items available for loan: Main Library - IDA (2)Call number: 658.478 SCH O, ...

270.
Amazon cover image
Image from Amazon.com
Managing information assurance in financial services / H. R. Rao, Manish Gupta, Shambhu J. Upadhyaya, [editors]. by
Material type: Text Text
Publication details: Hershey, PA : IGI Pub., c2007
Online resources:
Availability: Items available for loan: Jinja Campus (1)Call number: 332.10684 MAN.

271.
Amazon cover image
Image from Amazon.com
Network security essentials : applications and standards / Wil liam Stallings by
Edition: 6th ed.
Material type: Text Text
Publication details: Harlow, England: Pearson, 2017
Availability: Items available for loan: Jinja Campus (1)Call number: 005.8 STA.

272.
Amazon cover image
Image from Amazon.com
Computer security and penetration testing / Alfred Basta, Nadine Basta and Mary Brown by
Edition: 2nd
Material type: Text Text
Publication details: Stamford : Cengage Learning, 2014
Availability: Items available for loan: Jinja Campus (1)Call number: 005.8 BAS.

273.
Amazon cover image
Image from Amazon.com
Cryptography and network security : principles and practice / William Stallings. by
Edition: 7th ed.
Material type: Text Text
Publication details: Boston : Pearson , 2017
Availability: Items available for loan: College of Computing and Information Science - COCIS (1)Call number: 005.52 STA.

274.
Amazon cover image
Image from Amazon.com
Hands-on information security lab manual / by Michael Whitman, He rbert Mattord. by
Edition: 4th ed.
Material type: Text Text
Publication details: Australia : Cengage Learning c2014
Availability: Items available for loan: Jinja Campus (1)Call number: 005.8 WHI.