Your search returned 108 results.

Not what you expected? Check for suggestions
Sort
Results
81.
Practical embedded security : building secure resource-constrained systems / by Timothy Stapko. by Series: Embedded technology series
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Amsterdam ; Boston : Elsevier/Newnes, ©2008
Online resources:
Availability: Items available for loan: e-Library (1).
82.
Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures / Brian T. Contos. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Rockland, Mass. : Syngress, ©2006
Online resources:
Availability: Items available for loan: e-Library (1).
83.
National security / edited by H. Chen [and others]. by Series: Handbooks in information systems ; v. 2.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Amsterdam ; Oxford : Elsevier, 2007
Online resources:
Availability: Items available for loan: e-Library (1).
84.
Botnets : the killer web app / Craig A. Schiller [and others]. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Rockland, MA : Syngress Pub., ©2007
Online resources:
Availability: Items available for loan: e-Library (1).
85.
Developer's guide to web application security / Michael Cross. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Rockland, MA : Syngress Pub., ©2007
Online resources:
Availability: Items available for loan: e-Library (1).
86.
Network security assessment : from vulnerability to patch / Steve Manzuik, André Gold, Chris Gatford. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Rockland, Mass. : Sebastopol, Calif. : Syngress Pub. ; O'Reilly Media [distributor], ©2007
Online resources:
Availability: Items available for loan: e-Library (1).
87.
Designing and building enterprise DMZs / technical editor, Ido Dubrawsky ; authors, C. Tate Baumrucker [and others]. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Rockland, MA : Syngress, ©2006
Other title:
  • Designing and building enterprise demilitarized zones
Online resources:
Availability: Items available for loan: e-Library (1).
88.
Firewall policies and VPN configurations / Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Rockland, MA : Syngress, ©2006
Online resources:
Availability: Items available for loan: e-Library (1).
89.
Network security : a practical approach / Jan L. Harrington. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Amsterdam ; Boston : Elsevier : Morgan Kaufmann Publishers, ©2005
Online resources:
Availability: Items available for loan: e-Library (1).
90.
Practical VoIP security / Thomas Porter [and others]. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Rockland, MA : Syngress Pub., ©2006
Online resources:
Availability: Items available for loan: e-Library (1).
91.
Insider threat : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Rockland, Mass. : Oxford : Syngress ; Elsevier Science [distributor], 2006
Online resources:
Availability: Items available for loan: e-Library (1).
92.
Phishing exposed / Lance James ; foreward by Joe Stewart. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Rockland, MA : Syngress, ©2005
Online resources:
Availability: Items available for loan: e-Library (1).
93.
Cisco PIX firewalls : configure, manage, & troubleshoot / Thorsten Behrens [and others] ; Charles Riley, technical editor ; Umer Khan, technical reviewer. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Rockland, Mass. : Syngress Pub., ©2005
Online resources:
Availability: Items available for loan: e-Library (1).
94.
Penetration tester's open source toolkit / Johnny Long [and others]. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Rockland, Mass. : Syngress Pub., ©2006
Online resources:
Availability: Items available for loan: e-Library (1).
95.
Security log management : identifying patterns in the chaos / Jacob Babbin [and others]. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Rockland, MA : Syngress, ©2006
Online resources:
Availability: Items available for loan: e-Library (1).
96.
Cyber adversary characterization : auditing the hacker mind / Tom Parker [and 4 others]. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Rockland, MA : Syngress, [2004]Copyright date: ©2004
Online resources:
Availability: Items available for loan: e-Library (1).
97.
Security sage's guide to hardening the network infrastructure / Steven Andrés [and others] ; foreword by Erik Pace Birkholz. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Copyright date: ©2004
Other title:
  • Hardening the network infrastructure
Online resources:
Availability: Items available for loan: e-Library (1).
98.
Multicast and group security / Thomas Hardjono, Lakshminath R. Dondeti. by Series: Artech House computer security series
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Boston : Artech House, ©2003
Online resources:
Availability: Items available for loan: e-Library (1).
99.
100.
Managing Cisco network security / Eric Knipp [and others] ; Edgar Danielyan, technical editor. by
Edition: 2nd ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Copyright date: ©2002
Other title:
  • Cisco network security
Online resources:
Availability: Items available for loan: e-Library (1).
Pages

Powered by Koha