Your search returned 26 results.

Sort
Results
1.
MCSE/MCSA implementing and Administering Security in a Windows 2000 network: study guide and DVD training system (exam 70-214) Will Schmied and Thomas W. Shinder by
Publication details: Berlin Springer c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SCH.

2.
Principles of computer security: CompTIA Security+ and Beyone Wm Arthur Conklin, Gregory White, Dwayne Williams by
Publication details: New Delhi Mcgraw-hill/osborne Media 2012
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MCG.

3.
Web Service Security—scenarios, patterns, and implementation guidance for Web services Enhancements (WSE) 3. 0, patterns & practices, Hogg, Et Al by
Publication details: New Delhi P H I c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 WEB.

4.
Community experiences: reading and communication for civics Lynda Terrill, Jacqueline Flamm by
Publication details: New York McGraw-Hill c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 TER.

5.
Computer forensics and investigations Bill Nelson, Amelia Phillips by
Publication details: Indianapolis, IN Course Technology c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 NEL.

6.
Computer insecurity : risking the system Steven, Furnell by
Publication details: Berlin ; New York Springer c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 FUR.

7.
Computer safety, reliability, and security Farhad Ahamad, Seyed Shahrestani et al by
Publication details: United Kingdom [publisher not identified] 2016
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.1 AHA.

8.
Configuring juniper networks NetScreen & SSG firewalls Rob Cameron; Juniper Networks, Inc.; ScienceDirect (Online service); et al by
Publication details: Rockland, MA Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CAM.

9.
CYA securing exchange server 2003 and outlook Web access Henrik Walther, Patrick Santry by
Publication details: Rockland, MA Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 WAL.

10.
Database security IX : status and prospects : proceedings of the ninth annual IFIP TC11 workshop conference on database security, August 1995 Spooner , David L . ...et al by
Publication details: London Chapman and Hall 1996
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SPO.

11.
Digital contagions : a media archaeology of computer viruses Jussi Parikka
Publication details: Bern, Switzerland Lang 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PAR.44.

12.
Firewall fundamentals Wes Noonan, Ido Dubrawsky by
Publication details: Indianapolis, IN Cisco Press 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 NOO.

13.
Firewall: checkpoint Ng Vpn-1, ultimate reference Robert J. Shimonski, Debra Shinder, Anne Henmi by
Publication details: New York Dreamtech Press c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SHI.

14.
FISMA certification & accreditation handbook BY Laura Taylor; Matthew Shepherd by
Publication details: Rockland Syngress C2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 TAY.

15.
Handbook of security, cryptography and digital signature P.Ramachandran S.M. Bhaskar by
Publication details: New Delhi Viva books private ltd 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BHA.

16.
Hardware hacking: have fun while voiding your warranty Joe Grand, .... [et...al] by
Publication details: Rockland, MA Syngress c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 GRA.

17.
Insider threat : protecting the enterprise from sabotage, spying, and theft Eric Cole; Sandra Ring by
Publication details: Rockland Syngress c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 COL.

18.
Intrusion prevention and active response: deploying network and host IPS BY Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, Jake Babbin by
Publication details: Rockland Syngress c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 RAS.

19.
Configuring SonicWALL firewalls Dan Bendell; ScienceDirect (Online service); et al by
Publication details: Rockland Syngress Pub C2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 LAT.

20.
Cybersecurity operations handbook John W Rittinghouse; Bill Hancock by
Publication details: Amsterdam ; Boston Elsevier Digital Press c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 RIT.

21.
Guide to computer forensics and investigations Amelia Philips, Bill Nelson, Chris Steuart by
Edition: 4th ed
Publication details: Boston, MA Cengage Learning c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 NEL.

22.
Active directory disaster recovery Florian Rommel by
Publication details: New Delhi SPD c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 ROM.

23.
Audit and trace log management: consolidation and analysis Phillip Q. Maier by
Publication details: Boca Raton, FL Auerbach Publications 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MAI.

24.
Security engineering a guide to building dependable distributed system Ross J. Anderson by
Edition: 2nd ed.
Language: English
Publication details: New Delhi Wiley India Pvt. Ltd. c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 AND.

25.
Blockchain quickstart guide Kalpesh Parikh and Amit Johri explore cryptography, cryptocurrency, distributed ledger, hyperledger fabric, ethereum, smart contracts and dApps by
Edition: 1st ed.
Language: English
Publication details: New Delhi Bpb Publications 2022
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.8 PAR, ...

26.
Financial Cybersecurity Risk Management /Paul Rohmeyer, Jennifer L. Bayuk ; foreword by Dr. Larry Ponemon. Leadership Perspectives and Guidance for Systems and Institutions by
Edition: 1st edition
Publication details: Berkeley Apress reprint 2023
Availability: Items available for loan: Anna Centenary Library (2)Call number: 658.1 ROH, ...

Pages

Find us on the map

Powered by Koha