Skip to main content
Anna Centenary Library
Lists
Public lists
கணினி1
View all
Your cookies
Search history
Clear
Search the Library Catalogue
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Accession No.
Go
Advanced search
Search
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
Library
Log in to your account
×
Login:
Password:
Home
Advanced search
Results of search for 'pl:"Rockland, MA"'
Refine your search
Availability
Limit to records with available items
Authors
Astolfo, Dave
Baskin, Brian
Burnett, Mark
Cameron, Rob
Chaffin, Larry
Cross, Michael
Denis, Tom St
Ferrari, Giulio
Foster, James C
Grasdal, Martin
Hurley, Chris
Kleiman, Dave
Long, Johnny
Piltzecker, Tony
Porter, Thomas
Rogers, Russ
Shinder, Debra Littl...
Shinder, Thomas W
Varsalone, Jesse
Walther, Henrik
Show more
Show less
Item types
Books
English Books
Topics
Client/server comput...
Computer networks - ...
Computer science
Computer security
Data protection
Data Security
Database security
Electronic data proc...
FireWall
firewalls
Hacking
LEGO toys
Microsoft software -...
Microsoft Windows (C...
Microsoft Windows se...
Operating Systems
security
Security - Software
Security Measures
Windows server
Show more
Show less
Your search returned 126 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to...
[ New list ]
Results
1.
Macintosh OS X, iPod, and iPhone forensic analysis DVD toolkit
Ryan R. Kubasiak, Sean Morrissey, lead authors ; [contributing authors], Walter Barr ... [et al.] ; Jesse Varsalone, technical editor
by
Kubasiak, Ryan R
Morrissey, Sean
Varsalone, Jesse
Publication details:
Rockland, MA
Syngress Pub
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 VAR
.
2.
Malware forensics : investigating and analyzing malicious code
James M. Aquilina, Eoghan Casey, Cameron H. Malin
by
Aquilina, James M
Casey, Eoghan
Malin, Cameron H
Publication details:
Rockland, MA
Syngress Pub
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 AQU
.
3.
Managing and securing a cisco structured wireless-aware network
David Wall...[et..al]
by
Wall, David
Publication details:
Rockland, MA
Syngress Publishing
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 WAL
.
4.
Managing catastrophic loss of sensitive data
by Constantine Photopoulos
by
Photopoulos, Constantine
Publication details:
Rockland, MA
Syngress Pub
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.472 PHO
.
5.
No cover image available
MCSA / planning, implementing, and maintaining a Windows Server 2003 environment for an MCSE certified on Windows 2000
Anthony Piltzecker; Laura E Hunter; Melissa Craft
by
Hunter, Laura E
Publication details:
Rockland, MA
Syngress
2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 HUN
.
6.
MCSA/MCSE 70-292 : managing, and maintaining a Windows server 2003 environment for an MCSA certified on windows 2000 study guide
Will Schmied
by
Schmied, Will
Publication details:
Rockland, MA
Syngress Publishing
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 W SCH
.
7.
MCSA/MCSE, exam 70-290 : managing and maintaining a Windows Server 2003 environment : study guide and dvd training system
Thomas W. Shinder, Debra Littlejohn Shinder
by
Shinder, Deborah Littlejohn
Publication details:
Rockland, MA
Syngress Publishing
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.447682 W SHI
.
8.
MCSE designing security for a Windows Server 2003 network : exam 70-298 study guide
Elias N Khnaser; et al
by
Khnaser, Elias N
Publication details:
Rockland, MA
Syngress
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 KHN
.
9.
MCSE planning and maintaining a Windows server 2003 network infrastructure: exam 70-293 study guide and DVD training system
Martin Grasdal, Laura E. Hunter, Michael Cross ; Laura Hunter, technical reviewer ; Debra Littlejohn Shinder, technical editor ; Thomas W. Shinder, technical editor
by
Grasdal, Martin
Publication details:
Rockland, MA
Syngress
©2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4776 GRA
.
10.
MCSE: designing a windows server 2003 active directory and network infrastructure exam 70-297
Brain Barber... (et.al)
by
Barber, Brain
Publication details:
Rockland, MA
Syngress Publishing
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4469 BAR
.
11.
Metasploit toolkit for penetration testing, exploit development, and vulnerability research
David Maynor, K.K. Mookhey
by
Maynor, David
Mookhey, K. K
Publication details:
Rockland, MA
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.13 MAY
.
12.
Microsoft forefront security administration guide
Jesse Varsalone, technical editor
by
Varsalone, Jesse
Publication details:
Rockland, MA
Syngress Publishing
2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 VAR
.
13.
Microsoft log parser toolkit
Gabriele Giuseppini, Mark Burnett
by
Giuseppini, Gabriele
Burnett, Mark
Publication details:
Rockland, MA
Syngress Publishing
C2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 GUI
.
14.
Microsoft Virtual server 2005
Rogier Ditter........[etal..]
by
Dittner, Rogier
Publication details:
Rockland, MA
Syngress Publishing
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 DIT
.
15.
Microsoft Vista for IT security professionals
Anthony Piltzecker, technical editor ; Larry Chaffin ... [et al.]
by
Chaffin, Larry
Piltzecker, Tony
Publication details:
Rockland, MA
Syngress Publishing
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PIL
.
16.
Network security evaluation: using the NSA IEM
Bryan Cunningham....[et...al]
by
Cunningham, Bryan
Publication details:
Rockland, MA
Syngress Publishing, Inc
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CUN
.
17.
OS X for hackers at heart: the apple of every hacker's eye
Ken Caruso, Johnny Long, Chris Hurley
by
Caruso, Ken
Hurley, Chris
Long, Johnny
Publication details:
Rockland, MA
Syngress
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 CAR
.
18.
Penetration tester's open source toolkit
Aaron W. Bayles, technical editor and contributor ... [et al.]
by
Bayles, Aaron W
Publication details:
Rockland, MA
Syngress Publishing
c2007-
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BAY
.
19.
Perfect password
Mark Burnett, Dave Kleiman
by
Burnett, Mark
Kleiman, Dave
Publication details:
Rockland, MA
Syngress Publishing
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.82 BUR
.
20.
Perfect passwords : selection, protection, authentication
by Mark Burnett and Dave Kleiman
by
Burnett, Mark
Kleiman, Dave
Publication details:
Rockland, MA
Syngress
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.82 BUR
.
21.
Perl scripting for Windows security : live response, forensic analysis, and monitoring
Harlan Carvey ; [Dave Kleiman, technical editor ; contributing author, Jeremy Faircoth]
by
Carvey, Harlan A
Faircloth, Jeremy
Kleiman, Dave
Publication details:
Rockland, MA
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CAR
.
22.
Phishing exposed
Lance James
by
James, Lance
Publication details:
Rockland, MA
Syngress
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 JAM
.
23.
Physical and logical security convergence : powered by enterprise security management
Brian T. Contos ... [et al.] ; foreword by Regis McKenna
by
Contos, Brian T
Publication details:
Rockland, MA
Syngress Publishing
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CON
.
24.
Practical Oracle security : your unauthorized guide to relational database security
Josh Shaul, Aaron Ingram
by
Shaul, Josh
Ingram, Aaron
Publication details:
Rockland, MA
Syngress Pub
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.7575O SHA
.
25.
Practical VoIP security
Thomas Porter .............[etal]
by
Porter, Thomas
Baskin, Brian
Chaffin, Larry
Cross, Michael
Publication details:
Rockland, MA
Syngress
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
621.38212 POR
.
26.
Programmers ultimate security deskref: your programming security encyclopedia
James C. Foster, Steven C. Foster
by
Foster, James C
Foster, Steven C
Publication details:
Rockland, MA
Syngress Publishing
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 FOS
.
27.
Programming Lego Mindstorms NXT
Owen Bishop
by
Bishop, O. N
Publication details:
Rockland, MA
Syngress
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
629.89251 BIS
.
28.
Programming Lego Mindstorms with Java : the ultimate tool for Mindstorm maniacs
Giulio Ferrari ... [et al.] ; Dario Laverde, technical editor
by
Ferrari, Giulio
Publication details:
Rockland, MA
Syngress
2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
629.8925 FER
.
29.
The official CHFI exam 312-49 study guide : for computer hacking forensics investigators
Dave Kleiman....[et..al]
by
Kleiman, Dave
Publication details:
Rockland, MA
Syngress Pub
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KLE
.
30.
The pictorial arts of Japan and other writings
William Anderson
by
Anderson, William
Publication details:
Rockland, MA
Synapse
2007
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
702.0952 AND, ..
.
31.
The real MCTS/MCITP upgrading your MCSE on windows server 2003 to windows server 2008 exam:70-649 prep kit
Brien Posey ( et.al.)
by
Posey, Brien
Publication details:
Rockland, MA
Syngress Publishing
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 POS
.
32.
Tom Shinder's configuring ISA server 2004
BY Thomas W Shinder; Debra Littlejohn Shinder
Publication details:
Rockland, MA
Syngress
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 SHI
.
33.
Video conferencing over IP: configure, secure, and troubleshoot
Michael Gough, Jason Rosenfeld
by
Gough, Michael
Rosenfeld, Jason
Publication details:
Rockland, MA
Syngress Publishing, Inc
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
006.696 GOU
.
34.
Virtualization with VMware ESX server
Al Muller ... [et al.] ; foreword by Ralph Troupe
by
Muller, Al
Publication details:
Rockland, MA
Syngress
©2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.43 MUL
.
35.
War driving and wireless penetration testing
Chris Hurley.............[etal]
by
Hurley, Chris
Baker, Brian
Connelly. Daniel
Rogers, Russ
Publication details:
Rockland, MA
Syngress
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
621.384 HUR
.
36.
Wardriving: drive, detect, defend
Chris Hurley (et.al)
by
Hurley, Chrish
Publication details:
Rockland, MA
Syngress
2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 ROA
.
37.
Windows 2000 active directory
Melissa C.Craft
by
Craft, Melissa C
Publication details:
Rockland, MA
Syngress
2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.432W CRA
.
38.
Windows 2000 server system administration handbook
Paul Shields, Ralph Crump, Martin Weiss
by
Shields, Paul
Crumo, Ralds
Weiss, Martin
Publication details:
Rockland, MA
Syngress Media, Inc
c2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 SHI
.
39.
Windows to Linux migration toolkit
by David allen
by
Allen, David
Publication details:
Rockland, MA
Syngress
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.432L ALL
.
40.
Bignum math implementing cryptographic multiple precision arithmetic
Tom St Denis, Greg Rose
by
Denis, Tom St
Rose, Greg
Publication details:
Rockland, MA
Syngress Pub
©2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
519.7 PEN
.
41.
BizTalk server 2000 developer's guide for .Net
Robert Shimonski
by
Shimonski, Robert
Publication details:
Rockland, MA
Syngress
2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 SHI
.
42.
Black hat physical device security: exploiting hardware and software
Drew Miller, Michael Bednarczyk
by
Miller, Drew
Bednarczyk, Michael
Publication details:
Rockland, MA
Syngress Publishing, Inc
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MIL
.
43.
Bluetooth application developer's guide : the short range interconnect solution
David Kammer...[et al.]
by
Kammer, David
Bray, Jennifer
McNutt, Gordon
Senese, Brian
Publication details:
Rockland, MA
Syngress
2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
621.3981 KAM
.
44.
Botnets : the killer web app
Carig A. Schiller [et.al]
by
Schiller, Craig A
Publication details:
Rockland, MA
Syngress Publishing
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.678 SCH
.
45.
Buffer overflow attacks : detect, exploit, prevent
James C. Foster....[et...al]
by
Foster, James C
Publication details:
Rockland, MA
Syngress Publishing
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.84 FOS
.
46.
Building a VoIP network with Nortel's multimedia communication server 5100
Larry Chaffin
by
Chaffin, Larry
Publication details:
Rockland, MA
Syngress Pub
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
321.38212 CHA
.
47.
CD and DVD forensics
Paul Crowley ; Dave Kleiman, technical editor
by
Crowley, Paul
Publication details:
Rockland, MA
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968 CRO
.
48.
Check point next Generation with application Intelligence Security administration
Chris Tobkin, Daniel Kligerman, Syngress
by
Tobkin, Chris
Kligerman, Daniel
Publication details:
Rockland, MA
Syngress
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 TOB
.
49.
Check point NG: next generation security administration
Drew Simonis, Corey S. Pincock, Daniel Kligerman, Doug Maxwell, Cherie Amon, Allen Keele
by
Simonis, Drew
Publication details:
Rockland, MA
Syngress Publishing
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SIM
.
50.
Cisco Avvid and IP Telephony: design & implementation
Robert Padjen.....[et....al]
by
Padjen, Robert
Publication details:
Rockland, MA
Syngress Publishing
c2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.6 PAD
.
51.
Cisco Pix firewalls : configure, manage, & troubleshoot
Thorsten Behrens; ScienceDirect (Online service); et al
Publication details:
Rockland, MA
Syngress
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BEH
.
52.
Cisco security professionals: guide to secure intrusion detection systems
C. Tate Baumrucker, James D. Burton, Scott Dentler, Ido Dubrawsky, Vitaly Osipov, Michael Sweeney
by
Baumrucker, Tate C
Publication details:
Rockland, MA
Syngress Publishing
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BUR
.
53.
CISSP study guide
Eric Conrad, Seth Misenar and Joshua Feldman
by
Conrad, Eric
Feldman, Joshua
Misenar, Seth
Publication details:
Rockland, MA
Syngress/Elsevier
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.6 CON
.
54.
Combating spyware in the enterprise
Brian Baskin (et.al)
by
Baskin, Brian
Publication details:
Rockland, MA
Syngress
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BAS
.
55.
Configuring CISCO AVVID : architecture for voice, video, and integrated data
by
Syngress Solutions
Publication details:
Rockland, MA
Syngress Publishing
c2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
4.65
.
56.
Configuring IPV6 for CISCO IOS
Sam Brown .. Et al
by
Brown, Sam
Publication details:
Rockland, MA
Syngress
2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.62 BRO
.
57.
Configuring ISA server 2000: building firewalls for Windows 2000
Thomas Shinder, Debra Littlejohn Shinder, Martin Grasdal
by
Shinder, Thomas
Grasdal, Martin
Shinder, Debra Littlejohn
Publication details:
Rockland, MA
Syngress Publishing
c2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SHI
.
58.
Configuring juniper networks NetScreen & SSG firewalls
Rob Cameron; Juniper Networks, Inc.; ScienceDirect (Online service); et al
by
Cameron, Rob
Publication details:
Rockland, MA
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CAM
.
59.
Configuring Netscreen firewalls
Rob Cameron, Christopher Cantrell, Dave Killion
by
Cameron, Rob
Cantrell, Christopher
Killion, Dave
Publication details:
Rockland, MA
Syngress
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CAM
.
60.
Configuring Symantec antivirus
Laura E. Hunter, Athar A. Kahn, James Stanger, Jay cee taylor, Robert J. Shimonski
by
Hunter, Laura E
Edition:
Corporate edition
Publication details:
Rockland, MA
Syngress Publishing
2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.84 HUN
.
61.
Configuring Windows 2000 without active directory
Carol Bailey ; Thomas W. Shinder, technical editor
by
Bailey, Carol
Shinder, Thomas W
Publication details:
Rockland, MA
Syngress Media
©2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 BAI
.
62.
Cryptography for developers
Tom St Denis; Simon Johnson
by
Denis, Tom St
Johnson, Simon
Publication details:
Rockland, MA
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PEN
.
63.
CYA securing exchange server 2003 and outlook Web access
Henrik Walther, Patrick Santry
by
Walther, Henrik
Santry, Patrick
Publication details:
Rockland, MA
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 WAL
.
64.
CYA securing IIS 6. 0: cover your A** by getting it right the first time
Chun Hai Cheah, Ken Schaefer, Chris Peiris
by
Cheah, Chun Hai
Schaefer, Ken
Publication details:
Rockland, MA
Syngress
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CHE
.
65.
Cyber adversary characterization: auditing the hacker mind
Tom Parker...[et...al]
by
Parker, Tom
Publication details:
Rockland, MA
Syngress Publishing
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PAR
.
66.
Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutors
Anthony Reyes ... [et. al]
by
Reyes, Anthony
Publication details:
Rockland, MA
Syngress Publishing
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968 REY
.
67.
Cyber spying : tracking your family's (sometimes) secret online lives
Ted Fair; Michael Nordfelt; Sandra Ring
by
Fair, Ted
Nordfelt, Michael
Ring, Sandra
Publication details:
Rockland, MA
Syngress
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.678 FAI
.
68.
Designing a wireless network
Jeffrey Wheat et al
by
Wheat, Jeffrey
Hiser, Randy
McCullough, Andy
Neely, Alicia
Publication details:
Rockland, MA
Syngress Pub
2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
621.3821 WHE
.
69.
Designing SQL server 2000 databases
Robert Patton, Jennifer Ogle
by
Patton, Robert
Ogle, Jennifer
Publication details:
Rockland, MA
Syngress
c2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.7585S DES
.
70.
Developer's guide to web application security
Michael Cross
by
Cross, Michael
Publication details:
Rockland, MA
Syngress Pub
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CRO
.
71.
Developing .NET web services with XML
David Jorgensen
by
Jorgensen, David
Publication details:
Rockland, MA
Syngress Pub
2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
006.76.NET JOR
.
72.
Developing Web services with Java Apis for Xml using Wsdp
Foster Jay,Mick Porter
by
Foster, Jay
Porter, Mick
Publication details:
Rockland, MA
Syngress Publishing
2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.133 J FOS
.
73.
Dictionary of information security
Robert Slade
by
Slade, Robert
Publication details:
Rockland, MA
Syngress Publishing
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SLA
.
74.
Dr. Tom Shinder's ISA server 2006 migration guide
Debra Littlejohn Shinder, Thomas W. Shinder ; with Adrian F. Dimcev ... [et al.]
by
Shinder, Thomas W
Dimcev, Adrian F
Shinder, Debra Littlejohn
Publication details:
Rockland, MA
Syngress Publishing
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
TK5105.59 .S526 2007 005.8
.
75.
E-discovery : creating and managing an enterprisewide program : a technical guide to digital investigation and litigation support
Karen Schuler ; Cathleen P. Peterson and Eva Vincze, technical editors ; David Benton ... [et al.]
by
Benton, David
Peterson, Cathleen P
Schuler, Karen
Publication details:
Rockland, MA
Syngress Pub
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SCH
.
76.
Eleventh hour security+ : exam SYO-201 study guide
Ido Dubrawsky ; technical editor, Michael Cross
by
Dubrawsky, Ido
Publication details:
Rockland, MA
Syngress
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 DUB
.
77.
E-mail virus protection handbook
Syngress Publications
by
Syngress publications
Publication details:
Rockland, MA
Syngress Publishing
c2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SYN
.
78.
Enemy at the water cooler : real-life stories of insider threats and enterprise security management countermeasures
Brian T Contos
by
Contos, Brian T
Publication details:
Rockland, MA
Syngress
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 CON
.
79.
Essential computer security: everyone's guide to e-mail, internet, and wireless security
Tony Bradley, Harlan carvey
by
Bradley, Tony
Carvey, Harlan
Publication details:
Rockland, MA
Syngress Publishing
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BRA
.
80.
Game console hacking : Xbox, PlayStation, Nintendo, game boy, Atari, & Sega
Joe Grand, Albert Yarusso
by
Grand, Joe
Yarusso, Albert
Publication details:
Rockland, MA
Syngress
2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
006.7 GRA
.
81.
GFI network security and PCI compliance power tools
Brien Posey ; Troy Thompson, technical editor ; foreword by Laura Taylor
by
Posey, Brien
Thompson, Troy
Publication details:
Rockland, MA
Syngress Pub.
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 POS
.
82.
Google hacking for penetration testers. volume 2
Johnny Long
by
Long, Johnny
Publication details:
Rockland, MA
Syngress Pub.
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
025.04 LON.2
.
83.
Google talking
Johnny Long; Joshua Brashars; Brian Baskin
by
Long, Johnny
Baskin, Brian
Brashars, Joshua
Publication details:
Rockland, MA
Syngress
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.69 BAS
.
84.
Hack proofing ColdFusion
Greg Meyer....[et...al]
by
Meyer, Greg
Publication details:
Rockland, MA
Syngress Publishing
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MEY
.
85.
Hack proofing Linux : a guide to open source security
James Stanger, Patrick T. Lane, Edgar Danielyan
by
Stanger, James
Danielyan, Edgar
Lane, Patrick T
Publication details:
Rockland, MA
Syngress Publishing, Inc
c2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 STA
.
86.
Hack proofing sun Solaris 8
Wyman Miles. (et.al)
by
Miles, Wyman
Publication details:
Rockland, MA
Syngress
c2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MIL
.
87.
Hack Proofing your identity in the information age
Teri Bidwell, Neal O'farrell, Michael Cross
by
Bidwell, Teri
Cross, Michael
O'farrell, Neal
Publication details:
Rockland, MA
Syngress
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BID
.
88.
Hack proofing your network
David R. Mirza Ahmad (et.....al)
by
Ahmad, David R. Mirza
Edition:
2nd edition
Publication details:
Rockland, MA
Syngress
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 AHM
.
89.
Hack proofing your wireless network: your wireless network
Christian Barnes
by
Barnes, Christian
Publication details:
Rockland, MA
Syngress
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BAR
.
90.
Hack the stack: using Snort and Ethereal to master the 8 layers of an Insecure network
Michael Gregg...[et al]
by
Gregg, Michael
Bandes, Ron
Franklin, Brandon
Mays, George
Publication details:
Rockland, MA
Syngress Pub
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
GRE
.
91.
Hacking a terror network : the silent threat of covert channels
Russ Rogers
by
Rogers, Russ
Publication details:
Rockland, MA
Syngress
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
303.625 ROG
.
92.
Hacking the code: ASP.NET Web application security
Mark Burnett
Publication details:
Rockland, MA
Syngress
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BUR
.
93.
Hardware hacking: have fun while voiding your warranty
Joe Grand, .... [et...al]
by
Grand, Joe
Publication details:
Rockland, MA
Syngress
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 GRA
.
94.
Host integrity monitoring : using Osiris and Samhain
Bian Wotring; Bruce Potter, technical editor; foreword by Marcus J. Ranum
by
Potter, Bruce
Ranum, Marcus J
Wotring, Bian
Publication details:
Rockland, MA
Syngress
©2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 WOT
.
95.
How to cheat at administering office communications server 2007
Anthony Piltzecker, technical editor [and lead author], Rand Morimoto ; [contributing authors], Ron Barrett ... [et al.]
by
Barrett, Ronald
Morimoto, Rand
Piltzecker, Tony
Publication details:
Rockland, MA
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 PIL
.
96.
How to cheat at configuring exchange server 2007 : including outlook web, mobile, and voice access
Henrik Walther
by
Walther, Henrik
Publication details:
Rockland, MA
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 WAL
.
97.
How to cheat at configuring ISA server 2004
Thomas W Shinder; Debra Littlejohn Shinder
by
Shinder, Thomas W
Shinder, Debra Littlejohn
Publication details:
Rockland, MA
Syngress
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 SHI
.
98.
How to cheat at configuring VmWare ESX server
David Rule, Jr
by
Rule, David
Publication details:
Rockland, MA
Syngress Pub
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.43 RUL
.
99.
How to cheat at deploying and securing RFID
Paul Sanghera ... [et al.]
by
Sanghera, Paul
Bhargava, Hersh
Campbell, Anita
Das, Anand M
Publication details:
Rockland, MA
Syngress Pub
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.54 SAN
.
100.
How to cheat at designing security for a w2k3 server network
Rob Amini, Elias N. Khnaser, Chris Peiris, Susan Snedaker, Laura E. Hunter
by
Amini, Rob
Publication details:
Rockland, MA
Syngress Publishing
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 WHI
.
101.
How to cheat at IIS 7 server administration
Chris Adams, Conrad Agramont Jr., Gene Whitley
by
Adams, Chris
Agramont, Conrad
Whitley, Gene
Publication details:
Rockland, MA
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 ADA
.
102.
How to cheat at IT project management
Susan Snedaker, Nels Hoenig
by
Snedaker, Susan
Hoenig, Nels
Publication details:
Rockland, MA
Syngress Publishing
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.4038 SNE
.
103.
How to cheat at managing information Security
Mark Osborne, Paul M. Summitt
by
Osborne, Mark
Summitt, Paul M
Publication details:
Rockland, MA
Syngress
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 OSB
.
104.
How to cheat at managing Microsoft operations manager 2005
Tony Piltzecker.........etal
by
Piltzecker, Tony
Publication details:
Rockland, MA
Syngress
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 PIL
.
105.
How to cheat at managing Microsoft windows small business server 2003
Susan Snedaker, Daniel H. Bendell
by
Snedaker, Susan
Bendell, Daniel H
Publication details:
Rockland, MA
Syngress Publishing
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.36 SNE
.
106.
How to cheat at managing windows server update services
Tony Piltzecker.................etal
by
Piltzecker, Tony
Publication details:
Rockland, MA
Syngress
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.437 PIL
.
107.
How to cheat at Microsoft Vista administration
Jan Kanclirz Jr., technical editor ; [contributors] Pawan K. Bhardwaj ... [et al.]
by
Bhardwaj, Pawan K
Kanclirz, Jan
Publication details:
Rockland, MA
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.432W KAN
.
108.
How to cheat at securing a wireless network
Chris Hurley
by
Hurley, Chris
Publication details:
Rockland, MA
Syngress Publishing
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 HUR
.
109.
How to cheat at securing Linux
Mohan Krishnamurthy ... [et al.]
by
Krishnamurthy, Mohan
Publication details:
Rockland, MA
Syngress
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KRI
.
110.
How to cheat at securing SQL server 2005
Mark Horninger, technical editor ; [contributors] Timothy Blum ... [et al.]
by
Horninger, Mark
Publication details:
Rockland, MA
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.7585S HOR
.
111.
How to cheat at securing your network
[Ido Dubrawksy, technical editor]
by
Dubrawsky, Ido
Publication details:
Rockland, MA
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CRA
.
112.
How to cheat at Voip security
Thomas Porter, Michael Gough
by
Porter, Thomas
Gough, Michael
Publication details:
Rockland, MA
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.69 POR
.
113.
How to cheat at windows system administration: using command line scripts
Pawan K. Bhardwaj
by
Bhardwaj, Pawan K
Publication details:
Rockland, MA
Syngress Publishing
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.432 W BHA
.
114.
Infosec career hacking : sell your skillz, not your soul
Aaron W. Bayles, Ed Brindley, James C. Foster, Chris Hurley, Johnny Long
Publication details:
Rockland, MA
Syngress Publishing
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BAY
.
115.
Infosecurity 2008 threat analysis
[authors, Champ Clark III ... [et al.]] ; foreword by Richard Ford
by
Clark, Champ
Publication details:
Rockland, MA
Syngress Publishing
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SCH
.
116.
IP addressing and subnetting, including IPv6
Marc Blanchet
by
Blanchet, Marc
Publication details:
Rockland, MA
Syngress
c2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.678 WEG
.
117.
Islands in the clickstream : reflections on life in a virtual world
Richard Thieme
by
Thieme, Richard
Publication details:
Rockland, MA
Syngress Publishing
2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
303.4834 THI
.
118.
Lego software power tools with Ldraw Mlcad and Lpub
Kevin Clague,Miguel Agullo, Lars C.Hassing
by
Clague, Kevin
Agullo, Miguel
Hassing Lars C
Publication details:
Rockland, MA
Syngress Publishing
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.1 CLA
.
119.
Building robots with Lego mindstorms : the ultimate tool for mindstorms maniacs
Mario Ferrari, Giulio Ferrari, Ralph Hempel
by
Ferrari, Mario
Astolfo, Dave
Ferrari, Giulio
ScienceDirect (Online service)
Edition:
Updated ed
Publication details:
Rockland, MA ; Oxford
Elsevier Science [distributor], Syngress
2002
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
629.892 FER, ..
.
120.
Building robots with Lego mindstorms : the ultimate tool for mindstorms maniacs
Mario Ferrari, Giulio Ferrari, Ralph Hempel
by
Ferrari, Mario
Astolfo, Dave
Ferrari, Giulio
ScienceDirect (Online service)
Edition:
Updated ed
Publication details:
Rockland, MA ; Oxford
Elsevier Science [distributor], Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
629.892 AST
.
121.
Configuring SonicWall firewalls
by Chris Lathem et.al
by
Lathem, Chris
Bendell, Daniel H
Fortenberry, Benjamin W
Lynn, Kevin
Publication details:
Rockland, MA
Syngress Publishing
c2006
Availability:
No items available.
122.
Aggressive network self-defense
Neil Archibald...[et..al]
by
Archibald, Neil
Publication details:
Rockland, MA
Syngress Publishing
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 ARC
.
123.
ASP.Net web Developer's guide
Mesbah Ahmed, chris Garrett, jeremy faircloth, chris payne
by
Ahmed, Mesbah
Publication details:
Rockland, MA
Syngress
2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
006.76. Net AHM
.
124.
AVIEN malware defense guide for the enterprise
David Harley ... [et al.] ; foreword by Robert S. Vibert
by
Harley, David
Publication details:
Rockland, MA
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 HAR
.
125.
BigNum math implementing cryptographic multiple precision arithmetic
BigNum math implementing cryptographic multiple precision arithmetic
by
"Denis, Tom St"
"Tom St Denis, Greg Rose"
Edition:
"xviii, 296 p. : ill., pbk."
Publication details:
"Rockland, MA "
;
"Syngress Pub.,"
;
2006
Availability:
No items available.
126.
Enemy at the water cooler : real-life stories of insider threats and enterprise security management countermeasures
Enemy at the water cooler reallife stories of insider threats and enterprise security management countermeasures
by
"Contos, Brian T"
Brian T Contos
Edition:
"xxii, 262 p. : ill. ; 23 cm."
Publication details:
"Rockland, MA"
;
Syngress
;
2006
Availability:
No items available.
Pages
Find us on the map
Powered by
Koha