<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[ST. PAUL'S UNIVERSITY LIBRARY Search for '(su:{Computer security. })']]> </title> <!-- prettier-ignore-start --> <link> http://library.spu.ac.ke/cgi-bin/koha/opac-search.pl?q=ccl=%28su%3A%7BComputer%20security.%20%7D%29&#38;sort_by=relevance&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="http://library.spu.ac.ke/cgi-bin/koha/opac-search.pl?q=ccl=%28su%3A%7BComputer%20security.%20%7D%29&#38;sort_by=relevance&#38;format=rss" /> <description> <![CDATA[ Search results for '(su:{Computer security. })' at ST. PAUL'S UNIVERSITY LIBRARY]]> </description> <opensearch:totalResults>31</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="http://library.spu.ac.ke/cgi-bin/koha/opac-search.pl?q=ccl=%28su%3A%7BComputer%20security.%20%7D%29&#38;sort_by=relevance&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="q%3Dccl%3D%2528su%253A%257BComputer%2520security.%2520%257D%2529" startPage="" /> <item> <title> Foundations of computer security / </title> <dc:identifier>ISBN:1846281938 (hbk.) | 9781846281938</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=36717</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1846281938.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Salomon, D..<br /> London : Springer, 2006 .<br /> xxi, 368 p. : 25 cm..<br /> 1846281938 (hbk.) | 9781846281938 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=36717">Place hold on <em>Foundations of computer security /</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=36717</guid> </item> <item> <title> Information security management handbook / </title> <dc:identifier>ISBN:9781420067088 (hardcover : v. 2 ; alk. paper)</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=38403</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> Boca Raton : Auerbach Publications, 2007 .<br /> v. &lt;2-4&gt; : 24-26 cm..<br /> 9781420067088 (hardcover : v. 2 ; alk. paper) </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=38403">Place hold on <em>Information security management handbook /</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=38403</guid> </item> <item> <title> Guide to computer forensics and investigations </title> <dc:identifier>ISBN:9781435498839</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=38405</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1435498836.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Bill, Nelson.<br /> United States. Delmar 2009 .<br /> xxv,682 p. , Includes bibliographical references and index | Accompanying DVD-ROM contains tutorials, project files and software tools. 24 cm.+ 1 DVD-ROM (4 3/4 in.) .<br /> 9781435498839 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=38405">Place hold on <em>Guide to computer forensics and investigations</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=38405</guid> </item> <item> <title> Hacking exposed 6 : network security secrets &amp; solutions / </title> <dc:identifier>ISBN:9780071613743 (pbk.)</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=38419</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0071613749.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By McClure, Stuart..<br /> New York : McGraw-Hill, 2009 .<br /> xxvii, 687 p. : , Includes index. 23 cm..<br /> 9780071613743 (pbk.) </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=38419">Place hold on <em>Hacking exposed 6 :</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=38419</guid> </item> <item> <title> Computer security: art and science/ </title> <dc:identifier>ISBN:9780201440997</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=38658</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0201440997.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Bishop,Matt.<br /> Boston Addison Wesley 2003 .<br /> xli,1084 p. , Includes bibliographical references and index 24 cm..<br /> 9780201440997 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=38658">Place hold on <em>Computer security: </em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=38658</guid> </item> <item> <title> Network security essentials: Applications and standards/ </title> <dc:identifier>ISBN:9780137067923</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=38672</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0137067925.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Williams Stallings.<br /> Boston Pearson 2011 .<br /> 431p. , Includes bibliographical references and index 24cm..<br /> 9780137067923 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=38672">Place hold on <em>Network security essentials:</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=38672</guid> </item> <item> <title> Computer forensics and cyber crime: an introduction </title> <dc:identifier>ISBN:9780132447492</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=38681</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0132447495.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Britz, Marjie T..<br /> New Jersey Prentice Hall 2009 .<br /> xxi,380 p. 24 cm..<br /> 9780132447492 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=38681">Place hold on <em>Computer forensics and cyber crime:</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=38681</guid> </item> <item> <title> Hacking exposed : network security secrets &amp; solutions / </title> <dc:identifier>ISBN:9780072127485</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=47447</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0072127481.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Scambray, Joel .<br /> Berkeley, Calif. : Osborne/McGraw-Hill, 2001 .<br /> xxix, 703 p. : , McClure's name appears first on the previous edition 24 cm .<br /> 9780072127485 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=47447">Place hold on <em>Hacking exposed :</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=47447</guid> </item> <item> <title> Hacking exposed : network security secrets &amp; solutions / </title> <dc:identifier>ISBN:0072227427 (pbk.)</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=47449</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0072227427.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By McClure, Stuart..<br /> New York : McGraw-Hill/Osborne, 2003 .<br /> xxiv, 737 p. : , Previous ed.: 2001. | Includes index. 24 cm. +.<br /> 0072227427 (pbk.) </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=47449">Place hold on <em>Hacking exposed :</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=47449</guid> </item> <item> <title> Everything you need to know about the dangers of computer hacking / </title> <dc:identifier>ISBN:0823930343</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=48827</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0823930343.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Knittel, John,.<br /> New York : Rosen Pub. Group, 2000 .<br /> 63 p. : 25 cm..<br /> 0823930343 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=48827">Place hold on <em>Everything you need to know about the dangers of computer hacking /</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=48827</guid> </item> <item> <title> Designing network security / </title> <dc:identifier>ISBN:1587051176 | 9781587051173</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=48945</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1587051176.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Kaeo, Merike..<br /> Indianapolis, IN : Cisco Press, 2004 .<br /> xxiii, 745 p. : , Includes index. 24 cm..<br /> 1587051176 | 9781587051173 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=48945">Place hold on <em>Designing network security /</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=48945</guid> </item> <item> <title> Corporate computer security. </title> <dc:identifier>ISBN:9780132145350 | 0132145359</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=49162</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0132145359.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Boyle, Randall..<br /> Boston : Pearson, 2013 .<br /> xxiv, 664 p. : , Panko's name appears first on the earlier edition. 24 cm..<br /> 9780132145350 | 0132145359 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=49162">Place hold on <em>Corporate computer security.</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=49162</guid> </item> <item> <title> Guide to network defense and countermeasures / </title> <dc:identifier>ISBN:9780619131241</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=49190</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0619131241.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Holden,Greg.<br /> Thomson: Australia, 2003 .<br /> xxiv, 527 pages : , Includes index. 23 cm.<br /> 9780619131241 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=49190">Place hold on <em>Guide to network defense and countermeasures /</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=49190</guid> </item> <item> <title> Writing secure code / </title> <dc:identifier>ISBN:0735615888</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=49272</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0735615888.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Howard, Michael,.<br /> Redmond, Wash. : Microsoft Press, 2002 .<br /> xxiv, 477 p. : 24 cm..<br /> 0735615888 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=49272">Place hold on <em>Writing secure code /</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=49272</guid> </item> <item> <title> Maximum Linux security : a hacker's guide to protecting your Linux server and workstation / </title> <dc:identifier>ISBN:0672316706 | 9780672316708</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=50162</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0672316706.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> Indianapolis, Ind. : Sams, 2000 .<br /> xvii, 743 p. : 24 cm. +.<br /> 0672316706 | 9780672316708 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=50162">Place hold on <em>Maximum Linux security :</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=50162</guid> </item> <item> <title> Principles of information security / </title> <dc:identifier>ISBN:9781111138219 | 1111138214</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=50177</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1111138214.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Whitman, Michael E.,.<br /> Boston, MA : Course Technology, 2012 .<br /> xxxi, 617 p. : 24 cm..<br /> 9781111138219 | 1111138214 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=50177">Place hold on <em>Principles of information security /</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=50177</guid> </item> <item> <title> Maximum security : a hacker's guide to protecting your Internet site and network / </title> <dc:identifier>ISBN:0672313413</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=50191</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0672313413.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> Indianapolis, Ind. : Sams, 1998 .<br /> xxvii, 829 p. : 23 cm. +.<br /> 0672313413 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=50191">Place hold on <em>Maximum security :</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=50191</guid> </item> <item> <title> IBM WebSphere V5.0 security / </title> <dc:identifier>ISBN:9780738425498</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=50246</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0738425494.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> [United States] : IBM International Technical Support Organization, 2002 .<br /> xvi, 540 p. &quot; , &quot;December 2002.&quot; 23 cm..<br /> 9780738425498 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=50246">Place hold on <em>IBM WebSphere V5.0 security /</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=50246</guid> </item> <item> <title> CompTIA security+ exam guide (exam SYO-301) : </title> <dc:identifier>ISBN:9781424617708</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=50318</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1424617707.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> New York : McGraw-Hill, 2011 .<br /> xxxiv, 665 p. : 25 cm. +.<br /> 9781424617708 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=50318">Place hold on <em>CompTIA security+ exam guide (exam SYO-301) :</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=50318</guid> </item> <item> <title> Lab manual for Security+ guide to network security fundamentals / </title> <dc:identifier>ISBN:9780470067666</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=50794</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0470067667.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Cretaro, Paul. .<br /> Redmond, Washington : Microsoft Press, 2004 .<br /> vii, 309 p. : 24 cm. .<br /> 9780470067666 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=50794">Place hold on <em>Lab manual for Security+ guide to network security fundamentals /</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=50794</guid> </item> <item> <title> Guide to computer forensics and investigations / </title> <dc:identifier>ISBN:9781337568944 paperback | 1337568945 paperback</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56437</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1337568945.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Nelson, Bill,.<br /> Boston, MA : Cengage Learning, Inc., 2019 .<br /> xxx, 738 pages : , &quot;Information security&quot; 24 cm .<br /> 9781337568944 paperback | 1337568945 paperback </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=56437">Place hold on <em>Guide to computer forensics and investigations /</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56437</guid> </item> <item> <title> Information security management handbook / </title> <dc:identifier>ISBN:9781466567498</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56449</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/146656749X.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> Boca Raton, Fla. : | London : CRC Press Taylor &amp; Francis 2014 .<br /> xiv, 420p. : , Includes bibliographical references and index 26 cm..<br /> 9781466567498 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=56449">Place hold on <em>Information security management handbook /</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56449</guid> </item> <item> <title> Network security essentials : applications and standards </title> <dc:identifier>ISBN:9781292154855 | 1292154853</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56659</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1292154853.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings, William, .<br /> Boston : Pearson 2017 .<br /> 461 pages : , Include permanent access to student and instructor resources on the author website 23 cm .<br /> 9781292154855 | 1292154853 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=56659">Place hold on <em>Network security essentials :</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56659</guid> </item> <item> <title> Digital forensics explained / </title> <dc:identifier>ISBN:9780367503437</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56665</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0367503433.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Gogolin, Greg. .<br /> Boca Raton, FL : CRC Press 2021 .<br /> xx, 234 p. : , Includes bibliographical references and index. 27 cm. .<br /> 9780367503437 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=56665">Place hold on <em>Digital forensics explained /</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56665</guid> </item> <item> <title> Computer security : art and science / </title> <dc:identifier>ISBN:9780321712332 | 0321712331</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56671</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0321712331.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Bishop, Matt (Matthew A.),.<br /> Boston : Addison-Wesley 2019 .<br /> xlix, 1,383 pages : , Includes bibliographical references (pages 1251-1339) and index 24 cm .<br /> 9780321712332 | 0321712331 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=56671">Place hold on <em>Computer security :</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56671</guid> </item> <item> <title> pfSense essentials: the complete reference to the pfSense internet gateway and firewall </title> <dc:identifier>ISBN:9781937516048</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56771</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1937516040.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Reed, Jeremy C..<br /> [unknown place] : Reed Media Services, 2019 .<br /> xxii, 456p. : , Includes bibliographical references and index 28cm..<br /> 9781937516048 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=56771">Place hold on <em>pfSense essentials: </em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56771</guid> </item> <item> <title> Security and privacy in an IT world : managing and meeting online regulatory compliance in the 21st Century / </title> <dc:identifier>ISBN:9781988360140</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56801</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1988360145.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Mackinder, Craig.<br /> New York : Kinetics Design - kdbooks.ca, 2017 .<br /> 179 pages ; , Includes bibliographical references and index 24cm..<br /> 9781988360140 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=56801">Place hold on <em>Security and privacy in an IT world :</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56801</guid> </item> <item> <title> Data science for cyber-security / </title> <dc:identifier>ISBN:9781786345639 hardback </dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56803</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1786345633.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> London : World Scientific Publishing Co. , 2019 .<br /> x, 294 pages : , &quot;This volume contains papers submitted by speakers at the workshop 'Data Science for Cyber-Security' held at the Imperial College London during September 2017&quot; --preface. 24 cm..<br /> 9781786345639 hardback </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=56803">Place hold on <em>Data science for cyber-security /</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56803</guid> </item> <item> <title> Cyber security management : a governance, risk and compliance framework / </title> <dc:identifier>ISBN:9780367606169 | 9781472432094 (hardback : alk. paper) | 9781472432100 (ebook) | 9781472432117 (epub) </dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56806</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/036760616X.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Trim, Peter R. J..<br /> Farnham, Surrey ; | Burlington, VT ; | London ; Gower Publishing ; | Routledge, 2014 .<br /> xxii, 240 pages ; , Includes bibliographical references and index 25 cm .<br /> 9780367606169 | 9781472432094 (hardback : alk. paper) | 9781472432100 (ebook) | 9781472432117 (epub) </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=56806">Place hold on <em>Cyber security management :</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56806</guid> </item> <item> <title> Hacking exposed : malware and rootkits : security secrets &amp; solutions / </title> <dc:identifier>ISBN:9780071823074 | 9780071823074 020 0071823077 </dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56809</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0071823077.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Elisan, Christopher C..<br /> New York : McGraw-Hill Education, 2017 .<br /> xxii, 360 pages : , Revised edition of: Hacking exposed malware &amp; rootkits : malware &amp; rootkits security secrets &amp; solutions / Michael Davis, Sean Bodmer, Aaron Lemasters. 2010 24 cm .<br /> 9780071823074 | 9780071823074 020 0071823077 </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=56809">Place hold on <em>Hacking exposed :</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56809</guid> </item> <item> <title> Malware and computer security incidents : handling guides / </title> <dc:identifier>ISBN:9781629481913 | 9781629481920 ebook</dc:identifier> <!-- prettier-ignore-start --> <link>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56884</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1629481912.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> New York : Nova Publishers, 2013 .<br /> 161 pages : , Includes bibliographical references and index. 23 cm..<br /> 9781629481913 | 9781629481920 ebook </p> ]]> <![CDATA[ <p> <a href="http://library.spu.ac.ke/cgi-bin/koha/opac-reserve.pl?biblionumber=56884">Place hold on <em> Malware and computer security incidents :</em></a> </p> ]]> </description> <guid>http://library.spu.ac.ke/cgi-bin/koha/opac-detail.pl?biblionumber=56884</guid> </item> </channel> </rss>
