Your search returned 28 results.

Sort
Results
1.
Microsoft ISA Server 2006 unleashed Michael Noel by
Publication details: Indianapolis, IN SAMS 2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: TK5105.875.I57 N645 2008 005.8.

2.
Microsoft® Windows Server 2008 security resource kit Jesper M Johansson, with the Microsoft Security Team by
Publication details: Redmond, WA Microsoft Press c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 JOH.

3.
Network security firewalls & VPNs J. Michael Stewart by
Publication details: Sudbury, MA Jones & Bartlett Learning c2011
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 STE.

4.
Nokia firewall, VPN, and IPSO configuration guide Andrew Hay, Peter Giannoulis, Keli Hay by
Publication details: Burlington, MA Syngress Pub c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.1 HAY.

5.
Best damn firewall book period T.W. Shinder ... [et al.] by
Edition: 2nd ed
Publication details: Burlington, MA ; Oxford Elsevier Science [distributor], Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BEH.

6.
CCSP self-study : Cisco secure PIX Firewall advanced (CSPFA) Behzad Behtash by
Edition: 2nd ed
Publication details: Indianapolis, IN Cisco Press c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8076 BEH.

7.
Check point NGX R65 security administration Ralph Bonnell, technical editor ... [et al.] by
Publication details: Rockland, Mass. ; Oxford Elsevier Science [distributor], Syngress 2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BON.

8.
Cisco ASA : all-in-one firewall, IPS, anti-X, and VPN adaptive security appliance Jazib Frahim, Omar Santos by
Edition: 2nd ed
Publication details: Indianapolis, IN Cisco Press c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 FRA.

9.
Cisco ASA configuration Richard A. Deal by
Publication details: New York McGraw-Hill c2009
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.8 DEA, ...

10.
Cisco ASA, PIX, and FWSM firewall handbook David Hucaby by
Edition: 2nd ed
Publication details: Indianapolis, IN Cisco Press c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HUC.

11.
Cisco Pix firewalls Richard A. Deal by
Publication details: New York Osborne/McGraw-Hill 2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 DEA.

12.
Cisco router firewall security Richard A. Deal by
Publication details: Indianapolis, IN Cisco Press c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 DEA.

13.
Cisco secure firewall services module (FWSM) Ray Blair, Arvind Durai by
Publication details: Indianapolis, IN Cisco Press c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BLA.

14.
CSPFA Daniel P. Newman by
Publication details: Indianapolis, IN Que Certification c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.6 NEW.

15.
Dr. Tom Shinder's ISA server 2006 migration guide Debra Littlejohn Shinder, Thomas W. Shinder ; with Adrian F. Dimcev ... [et al.] by
Publication details: Rockland, MA Syngress Publishing c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: TK5105.59 .S526 2007 005.8.

16.
Firewall fundamentals Wes Noonan, Ido Dubrawsky by
Publication details: Indianapolis, IN Cisco Press 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 NOO.

17.
Firewalls : jumpstart for network and systems administrators John R. Vacca, Scott Ellis by
Publication details: Amsterdam ; Boston, MA Elsevier Digital c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 VAL.

18.
Firewalls : the complete reference Keith E Strassberg, Gary Rollie, Richard Gondek by
Publication details: New York McGraw-Hill c2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 STR.

19.
Firewalls and Internet security : repelling the wily hacker William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin by
Edition: 2nd ed
Publication details: Boston, MA Addison-Wesley c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CHE.

20.
Firewalls and VPNs : principles and practices Richard W. Tibbs, Edward B. Oakes by
Publication details: Upper Saddle River, NJ Pearson/Prentice Hall c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 TIB.

21.
Honeypots : tracking hackers Lance Spitzner by
Publication details: Boston, MA Addison-Wesley c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SPI.

22.
Integrating ISA server 2006 with Microsoft exchange 2007 by Fergus Strachan by
Publication details: Burlington, Mass Syngress/Elsevier c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 STR.

23.
ISA server 2004 unleashed Michael Noel by
Publication details: Indianapolis, IN SAMS c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 NOE.

24.
Linux firewalls Steve Suehring, Robert Ziegler by
Edition: 3rd ed
Publication details: Indianapolis, Ind Novell Press c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SUE.

25.
Security threat mitigation and response : understanding Cisco security MARS Dale Tesch and Greg Abelar by
Publication details: Indianapolis, IN Cisco Press 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 TES.

26.
Security threat mitigation and response : understanding Cisco security MARS Dale Tesch and Greg Abelar by
Publication details: Indianapolis, IN Cisco Press c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 TAS.

27.
Security threat mitigation and response : understanding Cisco security MARS Dale Tesch and Greg Abelar by
Publication details: Indianapolis, IN Cisco Press 2007
Availability: No items available.

28.
Security threat mitigation and response : understanding Cisco security MARS Dale Tesch and Greg Abelar by
Publication details: Indianapolis, IN Cisco Press c2007
Availability: No items available.

Pages

Find us on the map

Powered by Koha