Skip to main content
Anna Centenary Library
Lists
Public lists
கணினி1
View all
Your cookies
Search history
Clear
Search the Library Catalogue
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Accession No.
Go
Advanced search
Search
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
Library
Log in to your account
×
Login:
Password:
Home
Advanced search
Results of search for 'Provider:Syngress Publishing'
Refine your search
Availability
Limit to records with available items
Authors
Altheide, Cory
Bendell, Daniel H
Bradley, Tony
Burnett, Mark
Carvey, Harlan
Chaffin, Larry
Clark, Champ
Foster, James C
Foster, Jay
Foster, Steven C
Grasdal, Martin
Lane, Patrick T
Lathem, Chris
Padjen, Robert
Schiller, Craig A
Shinder, Debra Littl...
Shinder, Thomas
Slade, Robert
Snedaker, Susan
Varsalone, Jesse
Show more
Show less
Item types
Books
English Books
Topics
botnets
Computer crimes - In...
Computer networks - ...
Computer science
Computer security
Computers - Access c...
Data protection
Electronic data proc...
Firewalls (Computer ...
Linux Security
Microsoft ISA server
Microsoft software -...
Microsoft Windows
Microsoft Windows (C...
Microsoft Windows se...
Network Security
security
Security - Software
Video Conference
Windows Server syste...
Show more
Show less
Your search returned 52 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to...
[ New list ]
Results
1.
Managing and securing a cisco structured wireless-aware network
David Wall...[et..al]
by
Wall, David
Publication details:
Rockland, MA
Syngress Publishing
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 WAL
.
2.
MCSA/MCSE 70-292 : managing, and maintaining a Windows server 2003 environment for an MCSA certified on windows 2000 study guide
Will Schmied
by
Schmied, Will
Publication details:
Rockland, MA
Syngress Publishing
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 W SCH
.
3.
MCSA/MCSE, exam 70-290 : managing and maintaining a Windows Server 2003 environment : study guide and dvd training system
Thomas W. Shinder, Debra Littlejohn Shinder
by
Shinder, Deborah Littlejohn
Publication details:
Rockland, MA
Syngress Publishing
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.447682 W SHI
.
4.
MCSE: designing a windows server 2003 active directory and network infrastructure exam 70-297
Brain Barber... (et.al)
by
Barber, Brain
Publication details:
Rockland, MA
Syngress Publishing
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4469 BAR
.
5.
Microsoft forefront security administration guide
Jesse Varsalone, technical editor
by
Varsalone, Jesse
Publication details:
Rockland, MA
Syngress Publishing
2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 VAR
.
6.
Microsoft log parser toolkit
Gabriele Giuseppini, Mark Burnett
by
Giuseppini, Gabriele
Burnett, Mark
Publication details:
Rockland, MA
Syngress Publishing
C2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 GUI
.
7.
Microsoft Virtual server 2005
Rogier Ditter........[etal..]
by
Dittner, Rogier
Publication details:
Rockland, MA
Syngress Publishing
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 DIT
.
8.
Microsoft Vista for IT security professionals
Anthony Piltzecker, technical editor ; Larry Chaffin ... [et al.]
by
Chaffin, Larry
Piltzecker, Tony
Publication details:
Rockland, MA
Syngress Publishing
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PIL
.
9.
Netcat power tools
Jan Kanclirz Jr., technical editor; Brian Baskin, ... [et al]
by
Baskin, Brian
Kanclirz, Jan
Publication details:
Burlington, MA
Syngress Publishing, Inc
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KAN
.
10.
Network security evaluation: using the NSA IEM
Bryan Cunningham....[et...al]
by
Cunningham, Bryan
Publication details:
Rockland, MA
Syngress Publishing, Inc
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CUN
.
11.
Nmap in the enterprise : your guide to network scanning
Angela Orebaugh, Becky Pinkard
by
Orebaugh, Angela
Pinkard, Becky
Publication details:
Burlington, MA
Syngress Publishing
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 ORE
.
12.
Penetration tester's open source toolkit
Aaron W. Bayles, technical editor and contributor ... [et al.]
by
Bayles, Aaron W
Publication details:
Rockland, MA
Syngress Publishing
c2007-
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BAY
.
13.
Perfect password
Mark Burnett, Dave Kleiman
by
Burnett, Mark
Kleiman, Dave
Publication details:
Rockland, MA
Syngress Publishing
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.82 BUR
.
14.
Physical and logical security convergence : powered by enterprise security management
Brian T. Contos ... [et al.] ; foreword by Regis McKenna
by
Contos, Brian T
Publication details:
Rockland, MA
Syngress Publishing
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CON
.
15.
Programmers ultimate security deskref: your programming security encyclopedia
James C. Foster, Steven C. Foster
by
Foster, James C
Foster, Steven C
Publication details:
Rockland, MA
Syngress Publishing
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 FOS
.
16.
The Mezonic agenda : hacking the presidency
Herbert H. Thompson, Spyros Nomikos
by
Thompson, Herbert H
Nomikos, Spyros
Publication details:
Rockland
Syngress Publishing
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.62 THO
.
17.
The real MCTS/MCITP upgrading your MCSE on windows server 2003 to windows server 2008 exam:70-649 prep kit
Brien Posey ( et.al.)
by
Posey, Brien
Publication details:
Rockland, MA
Syngress Publishing
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 POS
.
18.
Unix and Linux forensic analysis DVD toolkit
Chris Pogue, Cory Altheide, Todd Haverkos
by
Pogue, Chris
Altheide, Cory
Haverkos, Todd
Publication details:
Burlington, MA
Syngress Publishing
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968 POG
.
19.
Video conferencing over IP: configure, secure, and troubleshoot
Michael Gough, Jason Rosenfeld
by
Gough, Michael
Rosenfeld, Jason
Publication details:
Rockland, MA
Syngress Publishing, Inc
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
006.696 GOU
.
20.
Zen and the art of information security
Ira Winkler
by
Winkler, Ira
Publication details:
Rockland
Syngress Publishing Inc
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 WIN
.
21.
Windows forensic analysis DVD toolkit 2E
Harlan Carvey ; Eoghan Casey, technical editor
by
Carvey, Harlan
Publication details:
Burlington
Syngress Publishing, Inc
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968364 CAR
.
22.
Black hat physical device security: exploiting hardware and software
Drew Miller, Michael Bednarczyk
by
Miller, Drew
Bednarczyk, Michael
Publication details:
Rockland, MA
Syngress Publishing, Inc
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MIL
.
23.
Botnets : the killer web app
Carig A. Schiller [et.al]
by
Schiller, Craig A
Publication details:
Rockland, MA
Syngress Publishing
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.678 SCH
.
24.
Buffer overflow attacks : detect, exploit, prevent
James C. Foster....[et...al]
by
Foster, James C
Publication details:
Rockland, MA
Syngress Publishing
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.84 FOS
.
25.
Check point NG: next generation security administration
Drew Simonis, Corey S. Pincock, Daniel Kligerman, Doug Maxwell, Cherie Amon, Allen Keele
by
Simonis, Drew
Publication details:
Rockland, MA
Syngress Publishing
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SIM
.
26.
Cisco Avvid and IP Telephony: design & implementation
Robert Padjen.....[et....al]
by
Padjen, Robert
Publication details:
Rockland, MA
Syngress Publishing
c2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.6 PAD
.
27.
Cisco security professionals: guide to secure intrusion detection systems
C. Tate Baumrucker, James D. Burton, Scott Dentler, Ido Dubrawsky, Vitaly Osipov, Michael Sweeney
by
Baumrucker, Tate C
Publication details:
Rockland, MA
Syngress Publishing
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BUR
.
28.
Configuring CISCO AVVID : architecture for voice, video, and integrated data
by
Syngress Solutions
Publication details:
Rockland, MA
Syngress Publishing
c2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
4.65
.
29.
Configuring ISA server 2000: building firewalls for Windows 2000
Thomas Shinder, Debra Littlejohn Shinder, Martin Grasdal
by
Shinder, Thomas
Grasdal, Martin
Shinder, Debra Littlejohn
Publication details:
Rockland, MA
Syngress Publishing
c2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SHI
.
30.
Configuring Symantec antivirus
Laura E. Hunter, Athar A. Kahn, James Stanger, Jay cee taylor, Robert J. Shimonski
by
Hunter, Laura E
Edition:
Corporate edition
Publication details:
Rockland, MA
Syngress Publishing
2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.84 HUN
.
31.
Cyber adversary characterization: auditing the hacker mind
Tom Parker...[et...al]
by
Parker, Tom
Publication details:
Rockland, MA
Syngress Publishing
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PAR
.
32.
Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutors
Anthony Reyes ... [et. al]
by
Reyes, Anthony
Publication details:
Rockland, MA
Syngress Publishing
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968 REY
.
33.
Developing Web services with Java Apis for Xml using Wsdp
Foster Jay,Mick Porter
by
Foster, Jay
Porter, Mick
Publication details:
Rockland, MA
Syngress Publishing
2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.133 J FOS
.
34.
Dictionary of information security
Robert Slade
by
Slade, Robert
Publication details:
Rockland, MA
Syngress Publishing
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SLA
.
35.
Dr. Tom Shinder's ISA server 2006 migration guide
Debra Littlejohn Shinder, Thomas W. Shinder ; with Adrian F. Dimcev ... [et al.]
by
Shinder, Thomas W
Dimcev, Adrian F
Shinder, Debra Littlejohn
Publication details:
Rockland, MA
Syngress Publishing
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
TK5105.59 .S526 2007 005.8
.
36.
E-mail virus protection handbook
Syngress Publications
by
Syngress publications
Publication details:
Rockland, MA
Syngress Publishing
c2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SYN
.
37.
Essential computer security: everyone's guide to e-mail, internet, and wireless security
Tony Bradley, Harlan carvey
by
Bradley, Tony
Carvey, Harlan
Publication details:
Rockland, MA
Syngress Publishing
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BRA
.
38.
Hack proofing ColdFusion
Greg Meyer....[et...al]
by
Meyer, Greg
Publication details:
Rockland, MA
Syngress Publishing
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MEY
.
39.
Hack proofing Linux : a guide to open source security
James Stanger, Patrick T. Lane, Edgar Danielyan
by
Stanger, James
Danielyan, Edgar
Lane, Patrick T
Publication details:
Rockland, MA
Syngress Publishing, Inc
c2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 STA
.
40.
How to cheat at designing security for a w2k3 server network
Rob Amini, Elias N. Khnaser, Chris Peiris, Susan Snedaker, Laura E. Hunter
by
Amini, Rob
Publication details:
Rockland, MA
Syngress Publishing
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 WHI
.
41.
How to cheat at IT project management
Susan Snedaker, Nels Hoenig
by
Snedaker, Susan
Hoenig, Nels
Publication details:
Rockland, MA
Syngress Publishing
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.4038 SNE
.
42.
How to cheat at managing Microsoft windows small business server 2003
Susan Snedaker, Daniel H. Bendell
by
Snedaker, Susan
Bendell, Daniel H
Publication details:
Rockland, MA
Syngress Publishing
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.36 SNE
.
43.
How to cheat at securing a wireless network
Chris Hurley
by
Hurley, Chris
Publication details:
Rockland, MA
Syngress Publishing
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 HUR
.
44.
How to cheat at windows system administration: using command line scripts
Pawan K. Bhardwaj
by
Bhardwaj, Pawan K
Publication details:
Rockland, MA
Syngress Publishing
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.432 W BHA
.
45.
Infosec career hacking : sell your skillz, not your soul
Aaron W. Bayles, Ed Brindley, James C. Foster, Chris Hurley, Johnny Long
Publication details:
Rockland, MA
Syngress Publishing
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BAY
.
46.
Infosecurity 2008 threat analysis
[authors, Champ Clark III ... [et al.]] ; foreword by Richard Ford
by
Clark, Champ
Publication details:
Rockland, MA
Syngress Publishing
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SCH
.
47.
Islands in the clickstream : reflections on life in a virtual world
Richard Thieme
by
Thieme, Richard
Publication details:
Rockland, MA
Syngress Publishing
2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
303.4834 THI
.
48.
Kismet hacking
Brad "RenderMan" Haines, Michael J. Schearer, Frank Thornton
by
Haines, Brad
Schearer, Michael J
Thornton, Frank
Publication details:
Burlington, MA
Syngress Publishing, Inc
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 HAI
.
49.
Lego software power tools with Ldraw Mlcad and Lpub
Kevin Clague,Miguel Agullo, Lars C.Hassing
by
Clague, Kevin
Agullo, Miguel
Hassing Lars C
Publication details:
Rockland, MA
Syngress Publishing
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.1 CLA
.
50.
Configuring SonicWall firewalls
by Chris Lathem et.al
by
Lathem, Chris
Bendell, Daniel H
Fortenberry, Benjamin W
Lynn, Kevin
Publication details:
Rockland, MA
Syngress Publishing
c2006
Availability:
No items available.
51.
Aggressive network self-defense
Neil Archibald...[et..al]
by
Archibald, Neil
Publication details:
Rockland, MA
Syngress Publishing
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 ARC
.
52.
Skype Me: from single user to small enterprise and beyound
Skype Me from single user to small enterprise and beyound
by
"Gough, Michael [ et.al ]"
Michael Gough [ et.al ]
Edition:
"xxx, 416 p. : ill. ; 24 cm. ; pbk."
Publication details:
Rockland
;
Syngress Publishing
;
2006
Availability:
Items available for loan:
Anna Centenary Library
(1).
Pages
Find us on the map
Powered by
Koha