Skip to content
You are not logged in |Login  
     
Limit search to available items
Result page:    
Subjects (1-50 of 228)
Computer networks -- Security measures.
1
Bestseller
BestsellerE-book
 

Item Status

2
Bestseller
BestsellerE-book
 

Advanced penetration testing for highly-secured environments


Allen, Lee (Information security specialist), author.
[Place of publication not identified] : Packt Publishing, 2016.
Second edition.

Rating:

Item Status

3
Bestseller
BestsellerE-book
 

Advanced penetration testing for highly-secured environments : the ultimate security guide


Allen, Lee (Information security specialist)
Birmingham : Packt Pub., 2012.

Rating:

Item Status

4
Bestseller
BestsellerE-book
 
5
Bestseller
BestsellerE-book
 

Item Status

6
Bestseller
BestsellerE-book
 

Item Status

7
Bestseller
BestsellerE-book
 

Item Status

8
Bestseller
BestsellerE-book
 

AWS SECURITY COOKBOOK;PRACTICAL SOLUTIONS FOR MANAGING SECURITY POLICIES, MONITORING, AUDITING, AND


HEARTIN KANIKATHOTTU.
[Place of publication not identified] PACKT Publishing, 2020.

Rating:

Item Status

9
Bestseller
BestsellerE-book
 

The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice


Winterfeld, Steve.
[Place of publication not identified] : Syngress, 2012.

Rating:

Item Status

10
Bestseller
BestsellerE-book
 

The basics of IT audit : purposes, processes, and practical information


Gantz, Stephen D., author.
Amsterdam : Elsevier, [2014]

Rating:

Item Status

11
Bestseller
BestsellerE-book
 

The basics of web hacking : tools and techniques to attack the Web


Pauli, Joshua J.
Amsterdam : Syngress, an imprint of Elsevier, 2013.

Rating:

Item Status

12
Bestseller
BestsellerE-book
 

Becoming the hacker : the playbook for getting inside the mind of an attacker


Pruteanu, Adrian, author.
Birmingham : Packt Publishing Ltd, 2019.

Rating:

Item Status

13
Bestseller
BestsellerE-book
 

Item Status

14
Bestseller
BestsellerE-book
 

Biohackers : the politics of open science


Delfanti, Alessandro, author.
London : Pluto Press, 2013.

Rating:

Item Status

15
Bestseller
BestsellerE-book
 

Blockchains for Network Security : Principles, technologies and applications



Stevenage : The Institution of Engineering and Technology, 2020.

Rating:

Item Status

16
Bestseller
BestsellerE-book
 

Botnets : the killer web app


Schiller, Craig A.
Rockland, MA : Syngress Pub., [2007]

Rating:

Item Status

17
Bestseller
BestsellerE-book
 

Building a pentesting lab for wireless networks : build your own secure enterprise or home penetrati


Fadyushin, Vyacheslav, author.
Birmingham, UK : Packt Publishing, 2016.

Rating:

Item Status

18
Bestseller
BestsellerE-book
 

Building a practical information security program


Andress, Jason, author.
Cambridge, MA : Syngress, [2017]

Rating:

Item Status

19
Bestseller
BestsellerE-book
 

Building DMZs for Enterprise networks


Shimonski, Robert.
Rockland, MA : Syngress Pub., [2003]

Rating:

Item Status

20
book
BookPrinted Material
 

Building Internet firewalls


Zwicky, Elizabeth D.
Beijing ; Cambridge [Mass.] : O'Reilly, [2000]
2nd ed.

Rating:

 

Item Status

Location Call No. Status OPAC Message Public Note Gift Note
 Moore Stacks  TK5105.59 .Z85 2000    Available  ---
21
Bestseller
BestsellerE-book
 
22
Bestseller
BestsellerE-book
 

Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtu


Cardwell, Kevin, author.
Birmingham : Packt Publishing, [2016].
Second edition.

Rating:

Item Status

23
Bestseller
BestsellerE-book
 

Business continuity and disaster recovery for infosec managers


Rittinghouse, John W.
Amsterdam ; Boston : Elsevier Digital Press, [2005]

Rating:

Item Status

24
Bestseller
BestsellerE-book
 

Business continuity & disaster recovery for IT professionals


Snedaker, Susan.
Burlington, MA : Syngress, [2007]

Rating:

Item Status

25
Bestseller
BestsellerE-book
 

Business continuity and disaster recovery planning for IT professionals


Snedaker, Susan.
Waltham : Syngress, 2013.
2 edition.

Rating:

Item Status

26
Bestseller
BestsellerE-book
 

Business continuity management system : a complete framework for implementing ISO 22301


Wong, Wei Ning Zechariah.
London ; Philadelphia : Kogan Page, 2015.

Rating:

Item Status

27
Bestseller
BestsellerE-book
 

Cisco PIX firewalls : configure, manage, & troubleshoot



Rockland, Mass. : Syngress Pub., [2005]

Rating:

Item Status

28
Bestseller
BestsellerE-book
 

Client-Honeypots : Exploring Malicious Websites


Göbel, Jan Gerrit.
München : Oldenbourg Verlog, [2011]

Rating:

Item Status

29
Bestseller
BestsellerE-book
 
30
Bestseller
BestsellerE-book
 

Computer and information security handbook



Amsterdam ; Boston : Elsevier ; Burlington, MA : Morgan Kaufmann, [2009]

Rating:

Item Status

31
Bestseller
BestsellerE-book
 

Computer and information security handbook



Amsterdam : Morgan Kaufmann Publishers is an imprint of Elsevier, [2013]
2nd ed.

Rating:

Item Status

32
Bestseller
BestsellerE-book
 

Computer and information security handbook



Cambridge, MA : Morgan Kaufmann Publishers, [2017]
Third edition.

Rating:

Item Status

33
Bestseller
BestsellerE-book
 

Computer forensics with FTK


Carbone, Fernando.
Birmingham, U.K. : Packt Pub., 2014.

Rating:

Item Status

34
book
BookPrinted Material
 

Computer network security and cyber ethics


Kizza, Joseph Migga.
Jefferson, N.C. : McFarland, 2002.

Rating:

 

Item Status

Location Call No. Status OPAC Message Public Note Gift Note
 Moore Stacks  TK5105.59 .K58 2002    Available  ---
35
Bestseller
BestsellerE-book
 

Computer security and encryption : an introduction


Chauhan, S. R., author.
Dulles, Virginia : Mercury Learning and Information, [2020]

Rating:

Item Status

36
Bestseller
BestsellerE-book
 

Computer security for nuclear security : implementation guide.



Vienna : International Atomic Energy Agency, 2021.

Rating:

Item Status

37
book
BookPrinted Material
 

Computer security : principles and practice


Stallings, William, author.
Hoboken, New Jersey : Pearson Education, Inc., [2018]
Fourth edition.

Rating:

 

Item Status

Location Call No. Status OPAC Message Public Note Gift Note
 Moore Stacks  QA76.9.A25 S685 2018    Available  ---
38
book
BookPrinted Material
 
39
Bestseller
BestsellerE-book
 

Item Status

40
Bestseller
BestsellerE-book
 

Configuring Check Point NGX VPN-1/FireWall-1


Stephens, Robert (Information security consultant)
Rockland, MA : Syngress Pub., [2005]

Rating:

Item Status

41
Bestseller
BestsellerE-book
 

Configuring Juniper Networks NetScreen & SSG firewalls



Rockland, Mass. : Syngress Pub., [2007]

Rating:

Item Status

42
Bestseller
BestsellerE-book
 

Cryptography and network security.


Parashar, Ajay Raj.
Bengaluru : Laxmi Publications, 2015.

Rating:

Item Status

43
Bestseller
BestsellerE-book
 

CRYPTOGRAPHY AND NETWORK SECURITY.


Achary, Rathnakar.
[Place of publication not identified] : NEW AGE INTERNATIONAL PUB, 2020.

Rating:

Item Status

44
Bestseller
BestsellerE-book
 
45
Bestseller
BestsellerE-book
 

Item Status

46
Bestseller
BestsellerE-book
 

Cyber crime, security and digital intelligence


Johnson, Mark, 1959-
Farnham, Surrey : Gower Pub. Ltd., 2013.

Rating:

Item Status

47
Bestseller
BestsellerE-book
 

Item Status

48
Bestseller
BestsellerE-book
 

Item Status

49
Bestseller
BestsellerE-book
 

Cybersecurity


Steinberg, Joseph (Cybersecurity expert), author.
Hoboken, New Jersey : John Wiley & Sons, Inc., [2020]

Rating:

Item Status

50
Bestseller
BestsellerE-book
 

Item Status

Resources
More Information
Result page: