Your search returned 126 results.

Sort
Results
1.
2.
Malware forensics : investigating and analyzing malicious code James M. Aquilina, Eoghan Casey, Cameron H. Malin by
Publication details: Rockland, MA Syngress Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 AQU.

3.
Managing and securing a cisco structured wireless-aware network David Wall...[et..al] by
Publication details: Rockland, MA Syngress Publishing c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 WAL.

4.
Managing catastrophic loss of sensitive data by Constantine Photopoulos by
Publication details: Rockland, MA Syngress Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.472 PHO.

5.
MCSA / planning, implementing, and maintaining a Windows Server 2003 environment for an MCSE certified on Windows 2000 Anthony Piltzecker; Laura E Hunter; Melissa Craft by
Publication details: Rockland, MA Syngress 2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 HUN.

6.
MCSA/MCSE 70-292 : managing, and maintaining a Windows server 2003 environment for an MCSA certified on windows 2000 study guide Will Schmied by
Publication details: Rockland, MA Syngress Publishing c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 W SCH.

7.
MCSA/MCSE, exam 70-290 : managing and maintaining a Windows Server 2003 environment : study guide and dvd training system Thomas W. Shinder, Debra Littlejohn Shinder by
Publication details: Rockland, MA Syngress Publishing c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.447682 W SHI.

8.
MCSE designing security for a Windows Server 2003 network : exam 70-298 study guide Elias N Khnaser; et al by
Publication details: Rockland, MA Syngress c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 KHN.

9.
10.
MCSE: designing a windows server 2003 active directory and network infrastructure exam 70-297 Brain Barber... (et.al) by
Publication details: Rockland, MA Syngress Publishing c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4469 BAR.

11.
Metasploit toolkit for penetration testing, exploit development, and vulnerability research David Maynor, K.K. Mookhey by
Publication details: Rockland, MA Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.13 MAY.

12.
Microsoft forefront security administration guide Jesse Varsalone, technical editor by
Publication details: Rockland, MA Syngress Publishing 2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 VAR.

13.
Microsoft log parser toolkit Gabriele Giuseppini, Mark Burnett by
Publication details: Rockland, MA Syngress Publishing C2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 GUI.

14.
Microsoft Virtual server 2005 Rogier Ditter........[etal..] by
Publication details: Rockland, MA Syngress Publishing 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 DIT.

15.
Microsoft Vista for IT security professionals Anthony Piltzecker, technical editor ; Larry Chaffin ... [et al.] by
Publication details: Rockland, MA Syngress Publishing c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PIL.

16.
Network security evaluation: using the NSA IEM Bryan Cunningham....[et...al] by
Publication details: Rockland, MA Syngress Publishing, Inc c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CUN.

17.
OS X for hackers at heart: the apple of every hacker's eye Ken Caruso, Johnny Long, Chris Hurley by
Publication details: Rockland, MA Syngress c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 CAR.

18.
Penetration tester's open source toolkit Aaron W. Bayles, technical editor and contributor ... [et al.] by
Publication details: Rockland, MA Syngress Publishing c2007-
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BAY.

19.
Perfect password Mark Burnett, Dave Kleiman by
Publication details: Rockland, MA Syngress Publishing c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.82 BUR.

20.
Perfect passwords : selection, protection, authentication by Mark Burnett and Dave Kleiman by
Publication details: Rockland, MA Syngress 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.82 BUR.

21.
22.
Phishing exposed Lance James by
Publication details: Rockland, MA Syngress 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 JAM.

23.
Physical and logical security convergence : powered by enterprise security management Brian T. Contos ... [et al.] ; foreword by Regis McKenna by
Publication details: Rockland, MA Syngress Publishing c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CON.

24.
Practical Oracle security : your unauthorized guide to relational database security Josh Shaul, Aaron Ingram by
Publication details: Rockland, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.7575O SHA.

25.
Practical VoIP security Thomas Porter .............[etal] by
Publication details: Rockland, MA Syngress 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 621.38212 POR.

26.
Programmers ultimate security deskref: your programming security encyclopedia James C. Foster, Steven C. Foster by
Publication details: Rockland, MA Syngress Publishing c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 FOS.

27.
Programming Lego Mindstorms NXT Owen Bishop by
Publication details: Rockland, MA Syngress c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 629.89251 BIS.

28.
Programming Lego Mindstorms with Java : the ultimate tool for Mindstorm maniacs Giulio Ferrari ... [et al.] ; Dario Laverde, technical editor by
Publication details: Rockland, MA Syngress 2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 629.8925 FER.

29.
The official CHFI exam 312-49 study guide : for computer hacking forensics investigators Dave Kleiman....[et..al] by
Publication details: Rockland, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KLE.

30.
The pictorial arts of Japan and other writings William Anderson by
Publication details: Rockland, MA Synapse 2007
Availability: Items available for loan: Anna Centenary Library (2)Call number: 702.0952 AND, ...

31.
The real MCTS/MCITP upgrading your MCSE on windows server 2003 to windows server 2008 exam:70-649 prep kit Brien Posey ( et.al.) by
Publication details: Rockland, MA Syngress Publishing c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 POS.

32.
Tom Shinder's configuring ISA server 2004 BY Thomas W Shinder; Debra Littlejohn Shinder
Publication details: Rockland, MA Syngress 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 SHI.

33.
Video conferencing over IP: configure, secure, and troubleshoot Michael Gough, Jason Rosenfeld by
Publication details: Rockland, MA Syngress Publishing, Inc c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.696 GOU.

34.
Virtualization with VMware ESX server Al Muller ... [et al.] ; foreword by Ralph Troupe by
Publication details: Rockland, MA Syngress ©2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.43 MUL.

35.
War driving and wireless penetration testing Chris Hurley.............[etal] by
Publication details: Rockland, MA Syngress 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 621.384 HUR.

36.
Wardriving: drive, detect, defend Chris Hurley (et.al) by
Publication details: Rockland, MA Syngress 2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 ROA.

37.
Windows 2000 active directory Melissa C.Craft by
Publication details: Rockland, MA Syngress 2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.432W CRA.

38.
Windows 2000 server system administration handbook Paul Shields, Ralph Crump, Martin Weiss by
Publication details: Rockland, MA Syngress Media, Inc c2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 SHI.

39.
Windows to Linux migration toolkit by David allen by
Publication details: Rockland, MA Syngress c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.432L ALL.

40.
Bignum math implementing cryptographic multiple precision arithmetic Tom St Denis, Greg Rose by
Publication details: Rockland, MA Syngress Pub ©2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 519.7 PEN.

41.
BizTalk server 2000 developer's guide for .Net Robert Shimonski by
Publication details: Rockland, MA Syngress 2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 SHI.

42.
Black hat physical device security: exploiting hardware and software Drew Miller, Michael Bednarczyk by
Publication details: Rockland, MA Syngress Publishing, Inc c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MIL.

43.
Bluetooth application developer's guide : the short range interconnect solution David Kammer...[et al.] by
Publication details: Rockland, MA Syngress 2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 621.3981 KAM.

44.
Botnets : the killer web app Carig A. Schiller [et.al] by
Publication details: Rockland, MA Syngress Publishing c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.678 SCH.

45.
Buffer overflow attacks : detect, exploit, prevent James C. Foster....[et...al] by
Publication details: Rockland, MA Syngress Publishing c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.84 FOS.

46.
Building a VoIP network with Nortel's multimedia communication server 5100 Larry Chaffin by
Publication details: Rockland, MA Syngress Pub 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 321.38212 CHA.

47.
CD and DVD forensics Paul Crowley ; Dave Kleiman, technical editor by
Publication details: Rockland, MA Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 CRO.

48.
Check point next Generation with application Intelligence Security administration Chris Tobkin, Daniel Kligerman, Syngress by
Publication details: Rockland, MA Syngress c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 TOB.

49.
Check point NG: next generation security administration Drew Simonis, Corey S. Pincock, Daniel Kligerman, Doug Maxwell, Cherie Amon, Allen Keele by
Publication details: Rockland, MA Syngress Publishing c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SIM.

50.
Cisco Avvid and IP Telephony: design & implementation Robert Padjen.....[et....al] by
Publication details: Rockland, MA Syngress Publishing c2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.6 PAD.

51.
Cisco Pix firewalls : configure, manage, & troubleshoot Thorsten Behrens; ScienceDirect (Online service); et al
Publication details: Rockland, MA Syngress c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BEH.

52.
Cisco security professionals: guide to secure intrusion detection systems C. Tate Baumrucker, James D. Burton, Scott Dentler, Ido Dubrawsky, Vitaly Osipov, Michael Sweeney by
Publication details: Rockland, MA Syngress Publishing 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BUR.

53.
CISSP study guide Eric Conrad, Seth Misenar and Joshua Feldman by
Publication details: Rockland, MA Syngress/Elsevier c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.6 CON.

54.
Combating spyware in the enterprise Brian Baskin (et.al) by
Publication details: Rockland, MA Syngress 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BAS.

55.
Configuring CISCO AVVID : architecture for voice, video, and integrated data by
Publication details: Rockland, MA Syngress Publishing c2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 4.65.

56.
Configuring IPV6 for CISCO IOS Sam Brown .. Et al by
Publication details: Rockland, MA Syngress 2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.62 BRO.

57.
Configuring ISA server 2000: building firewalls for Windows 2000 Thomas Shinder, Debra Littlejohn Shinder, Martin Grasdal by
Publication details: Rockland, MA Syngress Publishing c2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SHI.

58.
Configuring juniper networks NetScreen & SSG firewalls Rob Cameron; Juniper Networks, Inc.; ScienceDirect (Online service); et al by
Publication details: Rockland, MA Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CAM.

59.
Configuring Netscreen firewalls Rob Cameron, Christopher Cantrell, Dave Killion by
Publication details: Rockland, MA Syngress c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CAM.

60.
Configuring Symantec antivirus Laura E. Hunter, Athar A. Kahn, James Stanger, Jay cee taylor, Robert J. Shimonski by
Edition: Corporate edition
Publication details: Rockland, MA Syngress Publishing 2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.84 HUN.

61.
Configuring Windows 2000 without active directory Carol Bailey ; Thomas W. Shinder, technical editor by
Publication details: Rockland, MA Syngress Media ©2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 BAI.

62.
Cryptography for developers Tom St Denis; Simon Johnson by
Publication details: Rockland, MA Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PEN.

63.
CYA securing exchange server 2003 and outlook Web access Henrik Walther, Patrick Santry by
Publication details: Rockland, MA Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 WAL.

64.
CYA securing IIS 6. 0: cover your A** by getting it right the first time Chun Hai Cheah, Ken Schaefer, Chris Peiris by
Publication details: Rockland, MA Syngress c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CHE.

65.
Cyber adversary characterization: auditing the hacker mind Tom Parker...[et...al] by
Publication details: Rockland, MA Syngress Publishing c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PAR.

66.
Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutors Anthony Reyes ... [et. al] by
Publication details: Rockland, MA Syngress Publishing c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 REY.

67.
Cyber spying : tracking your family's (sometimes) secret online lives Ted Fair; Michael Nordfelt; Sandra Ring by
Publication details: Rockland, MA Syngress c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.678 FAI.

68.
Designing a wireless network Jeffrey Wheat et al by
Publication details: Rockland, MA Syngress Pub 2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 621.3821 WHE.

69.
Designing SQL server 2000 databases Robert Patton, Jennifer Ogle by
Publication details: Rockland, MA Syngress c2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.7585S DES.

70.
Developer's guide to web application security Michael Cross by
Publication details: Rockland, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CRO.

71.
Developing .NET web services with XML David Jorgensen by
Publication details: Rockland, MA Syngress Pub 2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.76.NET JOR.

72.
Developing Web services with Java Apis for Xml using Wsdp Foster Jay,Mick Porter by
Publication details: Rockland, MA Syngress Publishing 2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.133 J FOS.

73.
Dictionary of information security Robert Slade by
Publication details: Rockland, MA Syngress Publishing 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SLA.

74.
Dr. Tom Shinder's ISA server 2006 migration guide Debra Littlejohn Shinder, Thomas W. Shinder ; with Adrian F. Dimcev ... [et al.] by
Publication details: Rockland, MA Syngress Publishing c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: TK5105.59 .S526 2007 005.8.

75.
76.
Eleventh hour security+ : exam SYO-201 study guide Ido Dubrawsky ; technical editor, Michael Cross by
Publication details: Rockland, MA Syngress c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 DUB.

77.
E-mail virus protection handbook Syngress Publications by
Publication details: Rockland, MA Syngress Publishing c2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SYN.

78.
Enemy at the water cooler : real-life stories of insider threats and enterprise security management countermeasures Brian T Contos by
Publication details: Rockland, MA Syngress 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 CON.

79.
Essential computer security: everyone's guide to e-mail, internet, and wireless security Tony Bradley, Harlan carvey by
Publication details: Rockland, MA Syngress Publishing c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BRA.

80.
Game console hacking : Xbox, PlayStation, Nintendo, game boy, Atari, & Sega Joe Grand, Albert Yarusso by
Publication details: Rockland, MA Syngress 2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.7 GRA.

81.
GFI network security and PCI compliance power tools Brien Posey ; Troy Thompson, technical editor ; foreword by Laura Taylor by
Publication details: Rockland, MA Syngress Pub. c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 POS.

82.
Google hacking for penetration testers. volume 2 Johnny Long by
Publication details: Rockland, MA Syngress Pub. c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 025.04 LON.2.

83.
Google talking Johnny Long; Joshua Brashars; Brian Baskin by
Publication details: Rockland, MA Syngress 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.69 BAS.

84.
Hack proofing ColdFusion Greg Meyer....[et...al] by
Publication details: Rockland, MA Syngress Publishing c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MEY.

85.
Hack proofing Linux : a guide to open source security James Stanger, Patrick T. Lane, Edgar Danielyan by
Publication details: Rockland, MA Syngress Publishing, Inc c2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 STA.

86.
Hack proofing sun Solaris 8 Wyman Miles. (et.al) by
Publication details: Rockland, MA Syngress c2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MIL.

87.
Hack Proofing your identity in the information age Teri Bidwell, Neal O'farrell, Michael Cross by
Publication details: Rockland, MA Syngress c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BID.

88.
Hack proofing your network David R. Mirza Ahmad (et.....al) by
Edition: 2nd edition
Publication details: Rockland, MA Syngress c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 AHM.

89.
Hack proofing your wireless network: your wireless network Christian Barnes by
Publication details: Rockland, MA Syngress c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BAR.

90.
Hack the stack: using Snort and Ethereal to master the 8 layers of an Insecure network Michael Gregg...[et al] by
Publication details: Rockland, MA Syngress Pub 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: GRE.

91.
Hacking a terror network : the silent threat of covert channels Russ Rogers by
Publication details: Rockland, MA Syngress c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 303.625 ROG.

92.
Hacking the code: ASP.NET Web application security Mark Burnett
Publication details: Rockland, MA Syngress c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BUR.

93.
Hardware hacking: have fun while voiding your warranty Joe Grand, .... [et...al] by
Publication details: Rockland, MA Syngress c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 GRA.

94.
Host integrity monitoring : using Osiris and Samhain Bian Wotring; Bruce Potter, technical editor; foreword by Marcus J. Ranum by
Publication details: Rockland, MA Syngress ©2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 WOT.

95.
96.
How to cheat at configuring exchange server 2007 : including outlook web, mobile, and voice access Henrik Walther by
Publication details: Rockland, MA Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 WAL.

97.
How to cheat at configuring ISA server 2004 Thomas W Shinder; Debra Littlejohn Shinder by
Publication details: Rockland, MA Syngress c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 SHI.

98.
How to cheat at configuring VmWare ESX server David Rule, Jr by
Publication details: Rockland, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.43 RUL.

99.
How to cheat at deploying and securing RFID Paul Sanghera ... [et al.] by
Publication details: Rockland, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.54 SAN.

100.
How to cheat at designing security for a w2k3 server network Rob Amini, Elias N. Khnaser, Chris Peiris, Susan Snedaker, Laura E. Hunter by
Publication details: Rockland, MA Syngress Publishing c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 WHI.

101.
How to cheat at IIS 7 server administration Chris Adams, Conrad Agramont Jr., Gene Whitley by
Publication details: Rockland, MA Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 ADA.

102.
How to cheat at IT project management Susan Snedaker, Nels Hoenig by
Publication details: Rockland, MA Syngress Publishing 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.4038 SNE.

103.
How to cheat at managing information Security Mark Osborne, Paul M. Summitt by
Publication details: Rockland, MA Syngress c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 OSB.

104.
How to cheat at managing Microsoft operations manager 2005 Tony Piltzecker.........etal by
Publication details: Rockland, MA Syngress c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 PIL.

105.
How to cheat at managing Microsoft windows small business server 2003 Susan Snedaker, Daniel H. Bendell by
Publication details: Rockland, MA Syngress Publishing c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.36 SNE.

106.
How to cheat at managing windows server update services Tony Piltzecker.................etal by
Publication details: Rockland, MA Syngress c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.437 PIL.

107.
How to cheat at Microsoft Vista administration Jan Kanclirz Jr., technical editor ; [contributors] Pawan K. Bhardwaj ... [et al.] by
Publication details: Rockland, MA Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.432W KAN.

108.
How to cheat at securing a wireless network Chris Hurley by
Publication details: Rockland, MA Syngress Publishing c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HUR.

109.
How to cheat at securing Linux Mohan Krishnamurthy ... [et al.] by
Publication details: Rockland, MA Syngress c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KRI.

110.
How to cheat at securing SQL server 2005 Mark Horninger, technical editor ; [contributors] Timothy Blum ... [et al.] by
Publication details: Rockland, MA Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.7585S HOR.

111.
How to cheat at securing your network [Ido Dubrawksy, technical editor] by
Publication details: Rockland, MA Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CRA.

112.
How to cheat at Voip security Thomas Porter, Michael Gough by
Publication details: Rockland, MA Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.69 POR.

113.
How to cheat at windows system administration: using command line scripts Pawan K. Bhardwaj by
Publication details: Rockland, MA Syngress Publishing c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.432 W BHA.

114.
Infosec career hacking : sell your skillz, not your soul Aaron W. Bayles, Ed Brindley, James C. Foster, Chris Hurley, Johnny Long
Publication details: Rockland, MA Syngress Publishing c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BAY.

115.
Infosecurity 2008 threat analysis [authors, Champ Clark III ... [et al.]] ; foreword by Richard Ford by
Publication details: Rockland, MA Syngress Publishing c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SCH.

116.
IP addressing and subnetting, including IPv6 Marc Blanchet by
Publication details: Rockland, MA Syngress c2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.678 WEG.

117.
Islands in the clickstream : reflections on life in a virtual world Richard Thieme by
Publication details: Rockland, MA Syngress Publishing 2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 303.4834 THI.

118.
Lego software power tools with Ldraw Mlcad and Lpub Kevin Clague,Miguel Agullo, Lars C.Hassing by
Publication details: Rockland, MA Syngress Publishing c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.1 CLA.

119.
Building robots with Lego mindstorms : the ultimate tool for mindstorms maniacs Mario Ferrari, Giulio Ferrari, Ralph Hempel by
Edition: Updated ed
Publication details: Rockland, MA ; Oxford Elsevier Science [distributor], Syngress 2002
Availability: Items available for loan: Anna Centenary Library (2)Call number: 629.892 FER, ...

120.
Building robots with Lego mindstorms : the ultimate tool for mindstorms maniacs Mario Ferrari, Giulio Ferrari, Ralph Hempel by
Edition: Updated ed
Publication details: Rockland, MA ; Oxford Elsevier Science [distributor], Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 629.892 AST.

121.
Configuring SonicWall firewalls by Chris Lathem et.al by
Publication details: Rockland, MA Syngress Publishing c2006
Availability: No items available.

122.
Aggressive network self-defense Neil Archibald...[et..al] by
Publication details: Rockland, MA Syngress Publishing c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 ARC.

123.
ASP.Net web Developer's guide Mesbah Ahmed, chris Garrett, jeremy faircloth, chris payne by
Publication details: Rockland, MA Syngress 2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.76. Net AHM.

124.
AVIEN malware defense guide for the enterprise David Harley ... [et al.] ; foreword by Robert S. Vibert by
Publication details: Rockland, MA Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HAR.

125.
BigNum math implementing cryptographic multiple precision arithmetic BigNum math implementing cryptographic multiple precision arithmetic by
Edition: "xviii, 296 p. : ill., pbk."
Publication details: "Rockland, MA " ; "Syngress Pub.," ; 2006
Availability: No items available.

126.
Pages

Find us on the map

Powered by Koha