Skip to main content
Anna Centenary Library
Lists
Public lists
கணினி1
View all
Your cookies
Search history
Clear
Search the Library Catalogue
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Accession No.
Go
Advanced search
Search
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
Library
Log in to your account
×
Login:
Password:
Home
Advanced search
Results of search for 'Provider:Syngress Pub'
Refine your search
Availability
Limit to records with available items
Authors
Aquilina, James M
Asanka, Dinesh
Benton, David
Boiarkine, Valentine
Campbell, Anita
Casey, Eoghan
Chaffin, Larry
Cross, Michael
Das, Anand M
Denis, Tom St
Giannoulis, Peter
Hay, Andrew
Jorgensen, David
Liu, Dale
Mays, George
Peterson, Cathleen P
Rose, Greg
Schubert, Max
Shimonski, Robert
Varsalone, Jesse
Show more
Show less
Item types
English Books
Topics
Computer crimes
Computer networks - ...
Computer networks - ...
Computer science
Computer security
Computer viruses
Data Security
Database security
Electronic data proc...
Emergency management
Extranets (Computer ...
Firewalls (Computer ...
Internet telephony
Microsoft software -...
Records - Management...
Routers (Computer ne...
Software configurati...
SQL server - Examina...
Virtual computer sys...
Wireless communicati...
Show more
Show less
Your search returned 29 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to...
[ New list ]
Results
1.
Macintosh OS X, iPod, and iPhone forensic analysis DVD toolkit
Ryan R. Kubasiak, Sean Morrissey, lead authors ; [contributing authors], Walter Barr ... [et al.] ; Jesse Varsalone, technical editor
by
Kubasiak, Ryan R
Morrissey, Sean
Varsalone, Jesse
Publication details:
Rockland, MA
Syngress Pub
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 VAR
.
2.
Malware forensics : investigating and analyzing malicious code
James M. Aquilina, Eoghan Casey, Cameron H. Malin
by
Aquilina, James M
Casey, Eoghan
Malin, Cameron H
Publication details:
Rockland, MA
Syngress Pub
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 AQU
.
3.
Managing catastrophic loss of sensitive data
by Constantine Photopoulos
by
Photopoulos, Constantine
Publication details:
Rockland, MA
Syngress Pub
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.472 PHO
.
4.
Nagios 3 enterprise network monitoring : including plug-ins and hardware devices
Max Schubert ... [et al.]
by
Schubert, Max
Publication details:
Burlington, MA
Syngress Pub
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.24 SCH
.
5.
Next generation SSH2 implementation : securing data in motion
Dale Liu, lead author and technical editor ; Max Caceres ... [et al.]
by
Liu, Dale
Publication details:
Burlington, MA
Syngress Pub
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 LIU
.
6.
Nokia firewall, VPN, and IPSO configuration guide
Andrew Hay, Peter Giannoulis, Keli Hay
by
Hay, Andrew
Giannoulis, Peter
Hay, Keli
Publication details:
Burlington, MA
Syngress Pub
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.1 HAY
.
7.
Open source fuzzing tools
Gadi Evron... [et al. ]
by
Evron, Gadi
Publication details:
Burlington, MA
Syngress Pub
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.14 EVR
.
8.
OSSEC host-based intrusion detection guide
Andrew Hay, Daniel Cid, Rory Bray ; foreword by Stephen Northcutt
by
Hay, Andrew
Bray, Rory
Cid, Daniel
Publication details:
Burlington, MA
Syngress Pub
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 HOY
.
9.
Practical Oracle security : your unauthorized guide to relational database security
Josh Shaul, Aaron Ingram
by
Shaul, Josh
Ingram, Aaron
Publication details:
Rockland, MA
Syngress Pub
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.7575O SHA
.
10.
The official CHFI exam 312-49 study guide : for computer hacking forensics investigators
Dave Kleiman....[et..al]
by
Kleiman, Dave
Publication details:
Rockland, MA
Syngress Pub
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KLE
.
11.
The real MCTS SQL server 2008 exam 70-432 prep kit : database implementation and maintenance
Mark Horninger, technical editor ; Valentine Boiarkine, Denny Cherry and Steve Long, lead authors ; [contributing authors], Dinesh Asanka ... [et al.]
by
Asanka, Dinesh
Boiarkine, Valentine
Cherry, Denny
Publication details:
Burlington, Mass
Syngress Pub
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.7585S
.
12.
The real MCTS SQL server 2008 exam 70-433 prep kit : database design
Mark Horninger, technical editor ; Valentine Boiarkine and Herleson Pontes, lead authors ; [contributing authors,] Dinesh Asanka ... [et al.]
by
Asanka, Dinesh
Boiarkine, Valentine
Horninger, Mark
Publication details:
Burlington, Mass
Syngress Pub
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.7585S HOR
.
13.
Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting
John Hoopes, technical editor ; Aaron Bawcom ... [et al.]
by
Hoopes, John
Publication details:
Burlington, MA
Syngress Pub
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 HOD
.
14.
Bignum math implementing cryptographic multiple precision arithmetic
Tom St Denis, Greg Rose
by
Denis, Tom St
Rose, Greg
Publication details:
Rockland, MA
Syngress Pub
©2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
519.7 PEN
.
15.
Building a VoIP network with Nortel's multimedia communication server 5100
Larry Chaffin
by
Chaffin, Larry
Publication details:
Rockland, MA
Syngress Pub
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
321.38212 CHA
.
16.
Cisco CCNA/CCENT exam 640-802, 640-822, 640-816 preparation kit
Dale Liu ; Brian Barber, Luigi DiGrande, contributing technical editors ; contributors, Naomi J. Alpern ... [et al.]
by
Liu, Dale
Publication details:
Burlington, MA
Syngress Pub
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.6076 LIU
.
17.
CompTIA Network+ certification study guide : exam N10-004 2E
Robert J. Shimonski, technical editor ; Naomi Alpern, technical reviewer ; Michael Cross ... [et al.]
by
Alpern, Naomi
Cross, Michael
Shimonski, Robert
Publication details:
Burlington, MA
Syngress Pub./Elsevier
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.6 SHI
.
18.
Designing a wireless network
Jeffrey Wheat et al
by
Wheat, Jeffrey
Hiser, Randy
McCullough, Andy
Neely, Alicia
Publication details:
Rockland, MA
Syngress Pub
2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
621.3821 WHE
.
19.
Developer's guide to web application security
Michael Cross
by
Cross, Michael
Publication details:
Rockland, MA
Syngress Pub
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CRO
.
20.
Developing .NET web services with XML
David Jorgensen
by
Jorgensen, David
Publication details:
Rockland, MA
Syngress Pub
2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
006.76.NET JOR
.
21.
E-discovery : creating and managing an enterprisewide program : a technical guide to digital investigation and litigation support
Karen Schuler ; Cathleen P. Peterson and Eva Vincze, technical editors ; David Benton ... [et al.]
by
Benton, David
Peterson, Cathleen P
Schuler, Karen
Publication details:
Rockland, MA
Syngress Pub
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SCH
.
22.
GFI network security and PCI compliance power tools
Brien Posey ; Troy Thompson, technical editor ; foreword by Laura Taylor
by
Posey, Brien
Thompson, Troy
Publication details:
Rockland, MA
Syngress Pub.
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 POS
.
23.
Google hacking for penetration testers. volume 2
Johnny Long
by
Long, Johnny
Publication details:
Rockland, MA
Syngress Pub.
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
025.04 LON.2
.
24.
Hack the stack: using Snort and Ethereal to master the 8 layers of an Insecure network
Michael Gregg...[et al]
by
Gregg, Michael
Bandes, Ron
Franklin, Brandon
Mays, George
Publication details:
Rockland, MA
Syngress Pub
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
GRE
.
25.
How to cheat at configuring VmWare ESX server
David Rule, Jr
by
Rule, David
Publication details:
Rockland, MA
Syngress Pub
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.43 RUL
.
26.
How to cheat at deploying and securing RFID
Paul Sanghera ... [et al.]
by
Sanghera, Paul
Bhargava, Hersh
Campbell, Anita
Das, Anand M
Publication details:
Rockland, MA
Syngress Pub
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.54 SAN
.
27.
Linksys WRT54G : ultimate hacking
Paul Asadoorian, Larry Pesce
by
Asadoorian, Paul
Pesce, Larry
Publication details:
Burlington, MA
Syngress Pub
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.62 ASA
.
28.
Configuring SonicWALL firewalls
Dan Bendell; ScienceDirect (Online service); et al
by
Bendell, Dan
Publication details:
Rockland
Syngress Pub
C2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 LAT
.
29.
BigNum math implementing cryptographic multiple precision arithmetic
BigNum math implementing cryptographic multiple precision arithmetic
by
"Denis, Tom St"
"Tom St Denis, Greg Rose"
Edition:
"xviii, 296 p. : ill., pbk."
Publication details:
"Rockland, MA "
;
"Syngress Pub.,"
;
2006
Availability:
No items available.
Pages
Find us on the map
Powered by
Koha