Skip to main content
Anna Centenary Library
Lists
Public lists
கணினி1
View all
Your cookies
Search history
Clear
Search the Library Catalogue
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Accession No.
Go
Advanced search
Search
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
Library
Log in to your account
×
Login:
Password:
Home
Advanced search
Results of search for 'su:"Internet - Security measures"'
Refine your search
Availability
Limit to records with available items
Authors
Abelar, Greg
Alston, Nik
Blue, Scott Gleeson
Capehart, B. L
Chapple, Mike
Ellis, Juanita
Freedman, David H
Gralla, Preston
Hausman, Kalani Kirk
Jennings, Charles
Kempf, James
Mirkovic, Jelena
Noel, Michael
Patterson, Tom
Ramzan, Zulfikar
Robinson, Stephen R
Schultz, Eugene
Smith, Richard E
Speed, Tim
Tesch, Dale
Show more
Show less
Item types
Books
English Books
Topics
Computer crimes
Computer hackers
Computer networks - ...
Computer networks - ...
Computer security
Computer security - ...
Computer security - ...
Data encryption (Com...
Electronic commerce ...
Electronic counterme...
Electronic data proc...
Firewalls (Computer ...
Internet - Security ...
Internet - Security ...
Internet fraud
Microsoft ISA server
Microsoft Windows (C...
Power resources - Ma...
Push technology (Com...
Web servers
Show more
Show less
Your search returned 40 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to...
[ New list ]
Results
1.
Mapping security : the corporate security sourcebook for today's global economy
Tom Patterson with Scott Gleeson Blue
by
Patterson, Tom
Blue, Scott Gleeson
Publication details:
Boston, MA
Addison Wesley
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PAT
.
2.
MCSA/MCSE self-paced training kit (exam 70-350) : implementing Microsoft internet security and acceleration server 2004
Stan Reimer, Orin Thomas
by
Reimer, Stan
Thomas, Orin
Microsoft Corporation
Publication details:
Redmond, WA
Microsoft Press
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 REI
.
3.
Microsoft Internet security and acceleration (ISA) server 2004 administrator's pocket consultant
Bud Ratliff and Jason Ballard with the Microsoft ISA Server Team
by
Ratliff, Bud
Ballard, Jason
Publication details:
Redmond, WA
Microsoft Press
©2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 RAT
.
4.
Microsoft ISA Server 2006 unleashed
Michael Noel
by
Noel, Michael
Publication details:
Indianapolis, IN
SAMS
2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
TK5105.875.I57 N645 2008 005.8
.
5.
Network intrusion detection
Stephen Northcutt, Judy Novak
by
Northcutt, Stephen
Novak, Judy
Edition:
3rd ed
Publication details:
Indianapolis, Ind
New Riders Pub
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 NOR
.
6.
Principles and practice of information security : protecting computers from hackers and lawyers
Linda Volonino, Stephen R. Robinson with contributions by Charles P. Volonino
by
Volonino, Linda
Robinson, Stephen R
Volonino, Charles P
Edition:
1st ed
Publication details:
Upper Saddle River, NJ
Pearson/Prentice Hall
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 VOL
.
7.
No cover image available
Professional pen testing for Web applications
Andres Andreu
by
Andreu, Andres
Publication details:
New Delhi
Wiley Pub
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 AND
.
8.
The hundredth window : protecting your privacy and security in the age of the Internet
Charles Jennings and Lori Fena ; foreword by Esther Dyson
by
Jennings, Charles
Fena, Lori
Publication details:
New York
Free Press
2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 JEN
.
9.
The Internet security guidebook : from planning to deployment
Juanita Ellis, Tim Speed
by
Ellis, Juanita
Speed, Tim
Publication details:
San Diego, CA
Elsevier / Academic Press
c2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 ELL
.
10.
No cover image available
Trust and risk in Internet commerce
L. Jean Camp
by
Camp, L. Jean
Publication details:
Cambridge, MA
MIT Press
c2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CAM
.
11.
Web based energy information and control systems : case studies and applications
compiled and edited by Barney L. Capehart and Lynne C. Capehart
by
Capehart, B. L
Capehart, Lynne C
Publication details:
Lilburn, GA ; Boca Raton, FL
Distributed by Taylor & Francis, Fairmont Press
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.26 CAP
.
12.
Windows forensics : the field guide for conducting corporate computer investigations
Chad Steel
by
Steel, Chad
Publication details:
Indianapolis, IN
Wiley Pub
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 STE
.
13.
Windows Internet security : protecting your critical data
Seth Fogie, Cyrus Peikari
by
Fogie, Seth
Peikari, Cyrus
Publication details:
Upper Saddle River, NJ
Prentice Hall
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 FOG
.
14.
Wireless Internet security : architecture and protocols
James Kempf
by
Kempf, James
Publication details:
Cambridge
Cambridge University Press
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KEM
.
15.
Crimeware : understanding new attacks and defenses
Markus Jakobsson, Zulfikar Ramzan
by
Jakobsson, Markus
Ramzan, Zulfikar
Publication details:
Boston
Addison-Wesley
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 JAK
.
16.
Designing network security
Merike Kaeo
by
Kaeo, Merike
Edition:
2nd ed
Publication details:
Indianapolis, IN
Cisco Press
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KAE
.
17.
Disseminating security updates at Internet scale
by Jun Li, Peter Reiher, Gerald J. Popek
by
Li, Jun
Popek, Gerald
Reiher, Peter
Publication details:
Dordrecht ; Boston
Kluwer Academic Publishers
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 LI
.
18.
Dr. Tom Shinder's ISA server 2006 migration guide
Debra Littlejohn Shinder, Thomas W. Shinder ; with Adrian F. Dimcev ... [et al.]
by
Shinder, Thomas W
Dimcev, Adrian F
Shinder, Debra Littlejohn
Publication details:
Rockland, MA
Syngress Publishing
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
TK5105.59 .S526 2007 005.8
.
19.
Google hacking for penetration testers. volume 2
Johnny Long
by
Long, Johnny
Publication details:
Rockland, MA
Syngress Pub.
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
025.04 LON.2
.
20.
Hacker's challenge 2 : test your network security and forensic skills
Mike Schiffman ... [et al.]
by
Schiffman, Mike
Publication details:
New York
McGraw-Hill/Osborne
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SCH
.
21.
Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions
David Pollino ... [et al.]
by
Pollino, David
Publication details:
New York
McGraw-Hill
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 POL
.
22.
How personal & internet security works
Preston Gralla
by
Gralla, Preston
Publication details:
Indianapolis, Ind. ; London
Pearson Education [distributor], Que/Sams
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
HV6773 .G7245 2006 005.8
.
23.
Implementing homeland security for enterprise IT
Michael Erbschloe
by
Erbschloe, Michael
Publication details:
Amsterdam ; Boston
Elsevier, Digital Press
2004
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
005.8 ERB, ..
.
24.
Internet denial of service : attack and defense mechanisms
Jelena Mirkovic ... [et al.]
by
Mirkovic, Jelena
Publication details:
Upper Saddle River, NJ
Prentice Hall Professional Technical Reference
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MIR
.
25.
Internet security : a jumpstart for systems administrators and IT managers
Tim Speed, Juanita Ellis
by
Speed, Tim
Ellis, Juanita
Publication details:
Amsterdam ; Boston
Digital Press
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SPE
.
26.
Internet security : hacking, counterhacking, and society
[edited by] Kenneth Einar Himma
by
Himma, Kenneth Einar
Publication details:
Boston, MA
Jones and Bartlett Publishers
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 HIM
.
27.
Intrusion detection & prevention
Carl Endorf, Dr. Eugene Schultz, Jim Mellander
by
Endorf, Carl F
Mellander, Jim
Schultz, Eugene
Publication details:
New York
McGraw-Hill/Osborne
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 END
.
28.
IPSec : the new security standard for the Internet, intranets, and virtual private networks
Naganand Doraswamy, Dan Harkins
by
Doraswamy, Naganand
Harkins, Dan
Edition:
2nd ed
Publication details:
Upper Saddle River, NJ
Prentice Hall PTR
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 DOR
.
29.
ISA server 2004 unleashed
Michael Noel
by
Noel, Michael
Publication details:
Indianapolis, IN
SAMS
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 NOE
.
30.
I-sAFE Internet life skills activities : reproducible projects on learning to safely handle life online, grades 9-12
Publication details:
San Francisco, CA
Jossey-Bass
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.68 JOS
.
31.
I-sAFE Internet safety activities : reproducible projects for teachers and parents, grades K-8
Edition:
1st ed
Publication details:
San Francisco, CA
Jossey-Bass
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.678 JOY
.
32.
I-way robbery : crime on the Internet
William C. Boni and Gerald L. Kovacich
by
Boni, William C
Kovacich, Gerald L
Publication details:
Oxford, UK ; Burlington, MA
Butterworth-Heinemann
c1999
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 BON
.
33.
(SCTS) Symantec certified technical specialist : small business security study guide
Nik Alston, Mike Chapple, and Kalani Kirk Hausman
by
Alston, Nik
Chapple, Mike
Hausman, Kalani Kirk
Publication details:
Upper Saddle River, NJ
Addison-Wesley
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 ALS
.
34.
Internet cryptography
Richard E. Smith
by
Smith, Richard E
Publication details:
Boston, MA
Addison Wesley
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.82 SMI
.
35.
No cover image available
Internet cryptography
Richard E. Smith
by
Smith, Richard E
Publication details:
Boston, MA
Addison Wesley
c1997
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.82 SMI
.
36.
Security threat mitigation and response : understanding Cisco security MARS
Dale Tesch and Greg Abelar
by
Tesch, Dale
Abelar, Greg
Cisco Systems, Inc
Publication details:
Indianapolis, IN
Cisco Press
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 TES
.
37.
Security threat mitigation and response : understanding Cisco security MARS
Dale Tesch and Greg Abelar
by
Tesch, Dale
Abelar, Greg
Cisco Systems, Inc
Publication details:
Indianapolis, IN
Cisco Press
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 TAS
.
38.
At Large: The Strange Case of the World's Biggest Internet Invasion
David H Freedman; Charles C Mann
by
Freedman, David H
Mann, Charles C
Publication details:
New York
Simon & Schuster
1997
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.1680973 FRE
.
39.
Security threat mitigation and response : understanding Cisco security MARS
Dale Tesch and Greg Abelar
by
Tesch, Dale
Abelar, Greg
Cisco Systems, Inc
Publication details:
Indianapolis, IN
Cisco Press
2007
Availability:
No items available.
40.
Security threat mitigation and response : understanding Cisco security MARS
Dale Tesch and Greg Abelar
by
Tesch, Dale
Abelar, Greg
Cisco Systems, Inc
Publication details:
Indianapolis, IN
Cisco Press
c2007
Availability:
No items available.
Pages
Find us on the map
Powered by
Koha