Your search returned 52 results.

Sort
Results
1.
Managing and securing a cisco structured wireless-aware network David Wall...[et..al] by
Publication details: Rockland, MA Syngress Publishing c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 WAL.

2.
MCSA/MCSE 70-292 : managing, and maintaining a Windows server 2003 environment for an MCSA certified on windows 2000 study guide Will Schmied by
Publication details: Rockland, MA Syngress Publishing c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 W SCH.

3.
MCSA/MCSE, exam 70-290 : managing and maintaining a Windows Server 2003 environment : study guide and dvd training system Thomas W. Shinder, Debra Littlejohn Shinder by
Publication details: Rockland, MA Syngress Publishing c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.447682 W SHI.

4.
MCSE: designing a windows server 2003 active directory and network infrastructure exam 70-297 Brain Barber... (et.al) by
Publication details: Rockland, MA Syngress Publishing c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4469 BAR.

5.
Microsoft forefront security administration guide Jesse Varsalone, technical editor by
Publication details: Rockland, MA Syngress Publishing 2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 VAR.

6.
Microsoft log parser toolkit Gabriele Giuseppini, Mark Burnett by
Publication details: Rockland, MA Syngress Publishing C2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 GUI.

7.
Microsoft Virtual server 2005 Rogier Ditter........[etal..] by
Publication details: Rockland, MA Syngress Publishing 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 DIT.

8.
Microsoft Vista for IT security professionals Anthony Piltzecker, technical editor ; Larry Chaffin ... [et al.] by
Publication details: Rockland, MA Syngress Publishing c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PIL.

9.
Netcat power tools Jan Kanclirz Jr., technical editor; Brian Baskin, ... [et al] by
Publication details: Burlington, MA Syngress Publishing, Inc c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KAN.

10.
Network security evaluation: using the NSA IEM Bryan Cunningham....[et...al] by
Publication details: Rockland, MA Syngress Publishing, Inc c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CUN.

11.
Nmap in the enterprise : your guide to network scanning Angela Orebaugh, Becky Pinkard by
Publication details: Burlington, MA Syngress Publishing c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 ORE.

12.
Penetration tester's open source toolkit Aaron W. Bayles, technical editor and contributor ... [et al.] by
Publication details: Rockland, MA Syngress Publishing c2007-
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BAY.

13.
Perfect password Mark Burnett, Dave Kleiman by
Publication details: Rockland, MA Syngress Publishing c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.82 BUR.

14.
Physical and logical security convergence : powered by enterprise security management Brian T. Contos ... [et al.] ; foreword by Regis McKenna by
Publication details: Rockland, MA Syngress Publishing c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CON.

15.
Programmers ultimate security deskref: your programming security encyclopedia James C. Foster, Steven C. Foster by
Publication details: Rockland, MA Syngress Publishing c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 FOS.

16.
The Mezonic agenda : hacking the presidency Herbert H. Thompson, Spyros Nomikos by
Publication details: Rockland Syngress Publishing c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.62 THO.

17.
The real MCTS/MCITP upgrading your MCSE on windows server 2003 to windows server 2008 exam:70-649 prep kit Brien Posey ( et.al.) by
Publication details: Rockland, MA Syngress Publishing c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 POS.

18.
Unix and Linux forensic analysis DVD toolkit Chris Pogue, Cory Altheide, Todd Haverkos by
Publication details: Burlington, MA Syngress Publishing c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 POG.

19.
Video conferencing over IP: configure, secure, and troubleshoot Michael Gough, Jason Rosenfeld by
Publication details: Rockland, MA Syngress Publishing, Inc c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.696 GOU.

20.
Zen and the art of information security Ira Winkler by
Publication details: Rockland Syngress Publishing Inc 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 WIN.

21.
Windows forensic analysis DVD toolkit 2E Harlan Carvey ; Eoghan Casey, technical editor by
Publication details: Burlington Syngress Publishing, Inc c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968364 CAR.

22.
Black hat physical device security: exploiting hardware and software Drew Miller, Michael Bednarczyk by
Publication details: Rockland, MA Syngress Publishing, Inc c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MIL.

23.
Botnets : the killer web app Carig A. Schiller [et.al] by
Publication details: Rockland, MA Syngress Publishing c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.678 SCH.

24.
Buffer overflow attacks : detect, exploit, prevent James C. Foster....[et...al] by
Publication details: Rockland, MA Syngress Publishing c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.84 FOS.

25.
Check point NG: next generation security administration Drew Simonis, Corey S. Pincock, Daniel Kligerman, Doug Maxwell, Cherie Amon, Allen Keele by
Publication details: Rockland, MA Syngress Publishing c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SIM.

26.
Cisco Avvid and IP Telephony: design & implementation Robert Padjen.....[et....al] by
Publication details: Rockland, MA Syngress Publishing c2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.6 PAD.

27.
Cisco security professionals: guide to secure intrusion detection systems C. Tate Baumrucker, James D. Burton, Scott Dentler, Ido Dubrawsky, Vitaly Osipov, Michael Sweeney by
Publication details: Rockland, MA Syngress Publishing 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BUR.

28.
Configuring CISCO AVVID : architecture for voice, video, and integrated data by
Publication details: Rockland, MA Syngress Publishing c2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 4.65.

29.
Configuring ISA server 2000: building firewalls for Windows 2000 Thomas Shinder, Debra Littlejohn Shinder, Martin Grasdal by
Publication details: Rockland, MA Syngress Publishing c2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SHI.

30.
Configuring Symantec antivirus Laura E. Hunter, Athar A. Kahn, James Stanger, Jay cee taylor, Robert J. Shimonski by
Edition: Corporate edition
Publication details: Rockland, MA Syngress Publishing 2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.84 HUN.

31.
Cyber adversary characterization: auditing the hacker mind Tom Parker...[et...al] by
Publication details: Rockland, MA Syngress Publishing c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PAR.

32.
Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutors Anthony Reyes ... [et. al] by
Publication details: Rockland, MA Syngress Publishing c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 REY.

33.
Developing Web services with Java Apis for Xml using Wsdp Foster Jay,Mick Porter by
Publication details: Rockland, MA Syngress Publishing 2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.133 J FOS.

34.
Dictionary of information security Robert Slade by
Publication details: Rockland, MA Syngress Publishing 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SLA.

35.
Dr. Tom Shinder's ISA server 2006 migration guide Debra Littlejohn Shinder, Thomas W. Shinder ; with Adrian F. Dimcev ... [et al.] by
Publication details: Rockland, MA Syngress Publishing c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: TK5105.59 .S526 2007 005.8.

36.
E-mail virus protection handbook Syngress Publications by
Publication details: Rockland, MA Syngress Publishing c2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SYN.

37.
Essential computer security: everyone's guide to e-mail, internet, and wireless security Tony Bradley, Harlan carvey by
Publication details: Rockland, MA Syngress Publishing c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BRA.

38.
Hack proofing ColdFusion Greg Meyer....[et...al] by
Publication details: Rockland, MA Syngress Publishing c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MEY.

39.
Hack proofing Linux : a guide to open source security James Stanger, Patrick T. Lane, Edgar Danielyan by
Publication details: Rockland, MA Syngress Publishing, Inc c2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 STA.

40.
How to cheat at designing security for a w2k3 server network Rob Amini, Elias N. Khnaser, Chris Peiris, Susan Snedaker, Laura E. Hunter by
Publication details: Rockland, MA Syngress Publishing c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 WHI.

41.
How to cheat at IT project management Susan Snedaker, Nels Hoenig by
Publication details: Rockland, MA Syngress Publishing 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.4038 SNE.

42.
How to cheat at managing Microsoft windows small business server 2003 Susan Snedaker, Daniel H. Bendell by
Publication details: Rockland, MA Syngress Publishing c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.36 SNE.

43.
How to cheat at securing a wireless network Chris Hurley by
Publication details: Rockland, MA Syngress Publishing c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HUR.

44.
How to cheat at windows system administration: using command line scripts Pawan K. Bhardwaj by
Publication details: Rockland, MA Syngress Publishing c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.432 W BHA.

45.
Infosec career hacking : sell your skillz, not your soul Aaron W. Bayles, Ed Brindley, James C. Foster, Chris Hurley, Johnny Long
Publication details: Rockland, MA Syngress Publishing c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BAY.

46.
Infosecurity 2008 threat analysis [authors, Champ Clark III ... [et al.]] ; foreword by Richard Ford by
Publication details: Rockland, MA Syngress Publishing c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SCH.

47.
Islands in the clickstream : reflections on life in a virtual world Richard Thieme by
Publication details: Rockland, MA Syngress Publishing 2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 303.4834 THI.

48.
Kismet hacking Brad "RenderMan" Haines, Michael J. Schearer, Frank Thornton by
Publication details: Burlington, MA Syngress Publishing, Inc c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HAI.

49.
Lego software power tools with Ldraw Mlcad and Lpub Kevin Clague,Miguel Agullo, Lars C.Hassing by
Publication details: Rockland, MA Syngress Publishing c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.1 CLA.

50.
Configuring SonicWall firewalls by Chris Lathem et.al by
Publication details: Rockland, MA Syngress Publishing c2006
Availability: No items available.

51.
Aggressive network self-defense Neil Archibald...[et..al] by
Publication details: Rockland, MA Syngress Publishing c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 ARC.

52.
Skype Me: from single user to small enterprise and beyound Skype Me from single user to small enterprise and beyound by
Edition: "xxx, 416 p. : ill. ; 24 cm. ; pbk."
Publication details: Rockland ; Syngress Publishing ; 2006
Availability: Items available for loan: Anna Centenary Library (1).

Pages

Find us on the map

Powered by Koha