Your search returned 30 results.

Sort
Results
1.
Image from Google Jackets
2.
Image from Google Jackets
Malware forensics : investigating and analyzing malicious code James M. Aquilina, Eoghan Casey, Cameron H. Malin by
Publication details: Rockland, MA Syngress Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 AQU.

3.
Image from Google Jackets
Managing catastrophic loss of sensitive data by Constantine Photopoulos by
Publication details: Rockland, MA Syngress Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.472 PHO.

4.
Image from Google Jackets
Nagios 3 enterprise network monitoring : including plug-ins and hardware devices Max Schubert ... [et al.] by
Publication details: Burlington, MA Syngress Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.24 SCH.

5.
Image from Google Jackets
Next generation SSH2 implementation : securing data in motion Dale Liu, lead author and technical editor ; Max Caceres ... [et al.] by
Publication details: Burlington, MA Syngress Pub c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 LIU.

6.
Image from Google Jackets
Nokia firewall, VPN, and IPSO configuration guide Andrew Hay, Peter Giannoulis, Keli Hay by
Publication details: Burlington, MA Syngress Pub c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.1 HAY.

7.
Image from Google Jackets
Open source fuzzing tools Gadi Evron... [et al. ] by
Publication details: Burlington, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.14 EVR.

8.
Image from Google Jackets
OSSEC host-based intrusion detection guide Andrew Hay, Daniel Cid, Rory Bray ; foreword by Stephen Northcutt by
Publication details: Burlington, MA Syngress Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HOY.

9.
Image from Google Jackets
Practical Oracle security : your unauthorized guide to relational database security Josh Shaul, Aaron Ingram by
Publication details: Rockland, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.7575O SHA.

10.
Image from Google Jackets
The official CHFI exam 312-49 study guide : for computer hacking forensics investigators Dave Kleiman....[et..al] by
Publication details: Rockland, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KLE.

11.
Image from Google Jackets
12.
Image from Google Jackets
13.
Image from Google Jackets
Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting John Hoopes, technical editor ; Aaron Bawcom ... [et al.] by
Publication details: Burlington, MA Syngress Pub c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HOD.

14.
Image from Google Jackets
Bignum math implementing cryptographic multiple precision arithmetic Tom St Denis, Greg Rose by
Publication details: Rockland, MA Syngress Pub ©2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 519.7 PEN.

15.
Image from Google Jackets
Building a VoIP network with Nortel's multimedia communication server 5100 Larry Chaffin by
Publication details: Rockland, MA Syngress Pub 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 321.38212 CHA.

16.
Image from Google Jackets
Cisco CCNA/CCENT exam 640-802, 640-822, 640-816 preparation kit Dale Liu ; Brian Barber, Luigi DiGrande, contributing technical editors ; contributors, Naomi J. Alpern ... [et al.] by
Publication details: Burlington, MA Syngress Pub c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.6076 LIU.

17.
Image from Google Jackets
CompTIA Network+ certification study guide : exam N10-004 2E Robert J. Shimonski, technical editor ; Naomi Alpern, technical reviewer ; Michael Cross ... [et al.] by
Publication details: Burlington, MA Syngress Pub./Elsevier c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.6 SHI.

18.
Image from Google Jackets
Designing a wireless network Jeffrey Wheat et al by
Publication details: Rockland, MA Syngress Pub 2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 621.3821 WHE.

19.
Image from Google Jackets
Developer's guide to web application security Michael Cross by
Publication details: Rockland, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CRO.

20.
Image from Google Jackets
Developing .NET web services with XML David Jorgensen by
Publication details: Rockland, MA Syngress Pub 2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.76.NET JOR.

21.
Image from Google Jackets
22.
Image from Google Jackets
GFI network security and PCI compliance power tools Brien Posey ; Troy Thompson, technical editor ; foreword by Laura Taylor by
Publication details: Rockland, MA Syngress Pub. c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 POS.

23.
Image from Google Jackets
Google hacking for penetration testers. volume 2 Johnny Long by
Publication details: Rockland, MA Syngress Pub. c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 025.04 LON.2.

24.
Image from Google Jackets
Hack the stack: using Snort and Ethereal to master the 8 layers of an Insecure network Michael Gregg...[et al] by
Publication details: Rockland, MA Syngress Pub 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: GRE.

25.
Image from Google Jackets
How to cheat at configuring VmWare ESX server David Rule, Jr by
Publication details: Rockland, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.43 RUL.

26.
Image from Google Jackets
How to cheat at deploying and securing RFID Paul Sanghera ... [et al.] by
Publication details: Rockland, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.54 SAN.

27.
Image from Google Jackets
Linksys WRT54G : ultimate hacking Paul Asadoorian, Larry Pesce by
Publication details: Burlington, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.62 ASA.

28.
Image from Google Jackets
Configuring SonicWALL firewalls Dan Bendell; ScienceDirect (Online service); et al by
Publication details: Rockland Syngress Pub C2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 LAT.

29.
Image from Google Jackets
BigNum math implementing cryptographic multiple precision arithmetic BigNum math implementing cryptographic multiple precision arithmetic by
Edition: "xviii, 296 p. : ill., pbk."
Publication details: "Rockland, MA " ; "Syngress Pub.," ; 2006
Availability: No items available.

30.
Image from Google Jackets
Ruby Developer's Guide :Robert Feldt, Lyle Johnson, Michael Neumann by Language: English
Publication details: Rockland, Ma, Syngress Pub., ©2002
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.117 FEL.

Find us on the map