Your search returned 29 results.

Sort
Results
1.
2.
Malware forensics : investigating and analyzing malicious code James M. Aquilina, Eoghan Casey, Cameron H. Malin by
Publication details: Rockland, MA Syngress Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 AQU.

3.
Managing catastrophic loss of sensitive data by Constantine Photopoulos by
Publication details: Rockland, MA Syngress Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.472 PHO.

4.
Nagios 3 enterprise network monitoring : including plug-ins and hardware devices Max Schubert ... [et al.] by
Publication details: Burlington, MA Syngress Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.24 SCH.

5.
Next generation SSH2 implementation : securing data in motion Dale Liu, lead author and technical editor ; Max Caceres ... [et al.] by
Publication details: Burlington, MA Syngress Pub c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 LIU.

6.
Nokia firewall, VPN, and IPSO configuration guide Andrew Hay, Peter Giannoulis, Keli Hay by
Publication details: Burlington, MA Syngress Pub c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.1 HAY.

7.
Open source fuzzing tools Gadi Evron... [et al. ] by
Publication details: Burlington, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.14 EVR.

8.
OSSEC host-based intrusion detection guide Andrew Hay, Daniel Cid, Rory Bray ; foreword by Stephen Northcutt by
Publication details: Burlington, MA Syngress Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HOY.

9.
Practical Oracle security : your unauthorized guide to relational database security Josh Shaul, Aaron Ingram by
Publication details: Rockland, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.7575O SHA.

10.
The official CHFI exam 312-49 study guide : for computer hacking forensics investigators Dave Kleiman....[et..al] by
Publication details: Rockland, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KLE.

11.
12.
13.
Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting John Hoopes, technical editor ; Aaron Bawcom ... [et al.] by
Publication details: Burlington, MA Syngress Pub c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HOD.

14.
Bignum math implementing cryptographic multiple precision arithmetic Tom St Denis, Greg Rose by
Publication details: Rockland, MA Syngress Pub ©2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 519.7 PEN.

15.
Building a VoIP network with Nortel's multimedia communication server 5100 Larry Chaffin by
Publication details: Rockland, MA Syngress Pub 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 321.38212 CHA.

16.
Cisco CCNA/CCENT exam 640-802, 640-822, 640-816 preparation kit Dale Liu ; Brian Barber, Luigi DiGrande, contributing technical editors ; contributors, Naomi J. Alpern ... [et al.] by
Publication details: Burlington, MA Syngress Pub c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.6076 LIU.

17.
CompTIA Network+ certification study guide : exam N10-004 2E Robert J. Shimonski, technical editor ; Naomi Alpern, technical reviewer ; Michael Cross ... [et al.] by
Publication details: Burlington, MA Syngress Pub./Elsevier c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.6 SHI.

18.
Designing a wireless network Jeffrey Wheat et al by
Publication details: Rockland, MA Syngress Pub 2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 621.3821 WHE.

19.
Developer's guide to web application security Michael Cross by
Publication details: Rockland, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CRO.

20.
Developing .NET web services with XML David Jorgensen by
Publication details: Rockland, MA Syngress Pub 2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.76.NET JOR.

21.
22.
GFI network security and PCI compliance power tools Brien Posey ; Troy Thompson, technical editor ; foreword by Laura Taylor by
Publication details: Rockland, MA Syngress Pub. c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 POS.

23.
Google hacking for penetration testers. volume 2 Johnny Long by
Publication details: Rockland, MA Syngress Pub. c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 025.04 LON.2.

24.
Hack the stack: using Snort and Ethereal to master the 8 layers of an Insecure network Michael Gregg...[et al] by
Publication details: Rockland, MA Syngress Pub 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: GRE.

25.
How to cheat at configuring VmWare ESX server David Rule, Jr by
Publication details: Rockland, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.43 RUL.

26.
How to cheat at deploying and securing RFID Paul Sanghera ... [et al.] by
Publication details: Rockland, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.54 SAN.

27.
Linksys WRT54G : ultimate hacking Paul Asadoorian, Larry Pesce by
Publication details: Burlington, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.62 ASA.

28.
Configuring SonicWALL firewalls Dan Bendell; ScienceDirect (Online service); et al by
Publication details: Rockland Syngress Pub C2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 LAT.

29.
BigNum math implementing cryptographic multiple precision arithmetic BigNum math implementing cryptographic multiple precision arithmetic by
Edition: "xviii, 296 p. : ill., pbk."
Publication details: "Rockland, MA " ; "Syngress Pub.," ; 2006
Availability: No items available.

Pages

Find us on the map

Powered by Koha