Your search returned 55 results. Subscribe to this search

|
21. Data Warehousing and Data Mining Techniques for Cyber Security [electronic resource] / by Anoop Singhal.

by Singhal, Anoop | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2007Online access: Click here to access online Availability: No items available
22. Network Security Policies and Procedures [electronic resource] / by Douglas W. Frye.

by Frye, Douglas W | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2007Online access: Click here to access online Availability: No items available
23. Privacy-Respecting Intrusion Detection [electronic resource] / by Ulrich Flegel.

by Flegel, Ulrich | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2007Online access: Click here to access online Availability: No items available
24. Synchronizing Internet Protocol Security (SIPSec) [electronic resource] / by Charles A. Shoniregun.

by Shoniregun, Charles A | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2007Online access: Click here to access online Availability: No items available
25. Botnet Detection [electronic resource] : Countering the Largest Security Threat / edited by Wenke Lee, Cliff Wang, David Dagon.

by Lee, Wenke | Wang, Cliff | Dagon, David | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2008Online access: Click here to access online Availability: No items available
26. Security for Telecommunications Networks [electronic resource] / by Patrick Traynor, Patrick McDaniel, Thomas La Porta.

by Traynor, Patrick | McDaniel, Patrick | Porta, Thomas La | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2008Online access: Click here to access online Availability: No items available
27. Vulnerability Analysis and Defense for the Internet [electronic resource] / edited by Abhishek Singh, Baibhav Singh, Hirosh Joseph.

by Singh, Abhishek | Singh, Baibhav | Joseph, Hirosh | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2008Online access: Click here to access online Availability: No items available
28. Secure Multi-Party Non-Repudiation Protocols and Applications [electronic resource] / by José A. Onieva, Javier Lopez, Jianying Zhou.

by Onieva, José A | Lopez, Javier | Zhou, Jianying | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2009Online access: Click here to access online Availability: No items available
29. Intrusion Detection Systems [electronic resource] / edited by Luigi V. Mancini, Roberto Pietro.

by Mancini, Luigi V | Pietro, Roberto | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2008Online access: Click here to access online Availability: No items available
30. Primality Testing and Integer Factorization in Public-Key Cryptography [electronic resource] / by Song Y. Yan.

by Yan, Song Y | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2009Online access: Click here to access online Availability: No items available
31. Insider Attack and Cyber Security [electronic resource] : Beyond the Hacker / edited by Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair.

by Stolfo, Salvatore J | Bellovin, Steven M | Keromytis, Angelos D | Hershkop, Shlomo | Smith, Sean W | Sinclair, Sara | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2008Online access: Click here to access online Availability: No items available
32. Spyware and Adware [electronic resource] / by John Aycock.

by Aycock, John | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2011Online access: Click here to access online Availability: No items available
33. Electronic Healthcare Information Security [electronic resource] / by Charles A. Shoniregun, Kudakwashe Dube, Fredrick Mtenzi.

by Shoniregun, Charles A | Dube, Kudakwashe | Mtenzi, Fredrick | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2010Online access: Click here to access online Availability: No items available
34. Secure Key Establishment [electronic resource] / by Kim-Kwang Raymond Choo.

by Choo, Kim-Kwang Raymond | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2009Online access: Click here to access online Availability: No items available
35. Network Intrusion Detection and Prevention [electronic resource] : Concepts and Techniques / by Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee.

by Ghorbani, Ali A | Lu, Wei | Tavallaee, Mahbod | SpringerLink (Online service).

Edition: First.Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2010Online access: Click here to access online Availability: No items available
36. Security and Dependability for Ambient Intelligence [electronic resource] / edited by Spyros Kokolakis, Antonio Maña Gómez, George Spanoudakis.

by Kokolakis, Spyros | Gómez, Antonio Maña | Spanoudakis, George | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2009Online access: Click here to access online Availability: No items available
37. Identifying Malicious Code Through Reverse Engineering [electronic resource] / edited by Abhishek Singh.

by Singh, Abhishek | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2009Online access: Click here to access online Availability: No items available
38. Encryption for Digital Content [electronic resource] / by Aggelos Kiayias, Serdar Pehlivanoglu.

by Kiayias, Aggelos | Pehlivanoglu, Serdar | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2010Online access: Click here to access online Availability: No items available
39. Cyber Situational Awareness [electronic resource] : Issues and Research / edited by Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang.

by Jajodia, Sushil | Liu, Peng | Swarup, Vipin | Wang, Cliff | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2010Online access: Click here to access online Availability: No items available
40. Adaptive Cryptographic Access Control [electronic resource] / by Anne V. D. M. Kayem, Selim G. Akl, Patrick Martin.

by Kayem, Anne V. D. M | Akl, Selim G | Martin, Patrick | SpringerLink (Online service).

Source: Springer eBooksMaterial type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Boston, MA : Springer US, 2010Online access: Click here to access online Availability: No items available

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue