Your search returned 40 results.

Sort
Results
1.
Mapping security : the corporate security sourcebook for today's global economy Tom Patterson with Scott Gleeson Blue by
Publication details: Boston, MA Addison Wesley c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PAT.

2.
MCSA/MCSE self-paced training kit (exam 70-350) : implementing Microsoft internet security and acceleration server 2004 Stan Reimer, Orin Thomas by
Publication details: Redmond, WA Microsoft Press c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 REI.

3.
Microsoft Internet security and acceleration (ISA) server 2004 administrator's pocket consultant Bud Ratliff and Jason Ballard with the Microsoft ISA Server Team by
Publication details: Redmond, WA Microsoft Press ©2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 RAT.

4.
Microsoft ISA Server 2006 unleashed Michael Noel by
Publication details: Indianapolis, IN SAMS 2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: TK5105.875.I57 N645 2008 005.8.

5.
Network intrusion detection Stephen Northcutt, Judy Novak by
Edition: 3rd ed
Publication details: Indianapolis, Ind New Riders Pub c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 NOR.

6.
Principles and practice of information security : protecting computers from hackers and lawyers Linda Volonino, Stephen R. Robinson with contributions by Charles P. Volonino by
Edition: 1st ed
Publication details: Upper Saddle River, NJ Pearson/Prentice Hall c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 VOL.

7.
Professional pen testing for Web applications Andres Andreu by
Publication details: New Delhi Wiley Pub 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 AND.

8.
The hundredth window : protecting your privacy and security in the age of the Internet Charles Jennings and Lori Fena ; foreword by Esther Dyson by
Publication details: New York Free Press 2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 JEN.

9.
The Internet security guidebook : from planning to deployment Juanita Ellis, Tim Speed by
Publication details: San Diego, CA Elsevier / Academic Press c2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 ELL.

10.
Trust and risk in Internet commerce L. Jean Camp by
Publication details: Cambridge, MA MIT Press c2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CAM.

11.
Web based energy information and control systems : case studies and applications compiled and edited by Barney L. Capehart and Lynne C. Capehart by
Publication details: Lilburn, GA ; Boca Raton, FL Distributed by Taylor & Francis, Fairmont Press 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.26 CAP.

12.
Windows forensics : the field guide for conducting corporate computer investigations Chad Steel by
Publication details: Indianapolis, IN Wiley Pub c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 STE.

13.
Windows Internet security : protecting your critical data Seth Fogie, Cyrus Peikari by
Publication details: Upper Saddle River, NJ Prentice Hall c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 FOG.

14.
Wireless Internet security : architecture and protocols James Kempf by
Publication details: Cambridge Cambridge University Press c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KEM.

15.
Crimeware : understanding new attacks and defenses Markus Jakobsson, Zulfikar Ramzan by
Publication details: Boston Addison-Wesley c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 JAK.

16.
Designing network security Merike Kaeo by
Edition: 2nd ed
Publication details: Indianapolis, IN Cisco Press c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KAE.

17.
Disseminating security updates at Internet scale by Jun Li, Peter Reiher, Gerald J. Popek by
Publication details: Dordrecht ; Boston Kluwer Academic Publishers c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 LI.

18.
Dr. Tom Shinder's ISA server 2006 migration guide Debra Littlejohn Shinder, Thomas W. Shinder ; with Adrian F. Dimcev ... [et al.] by
Publication details: Rockland, MA Syngress Publishing c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: TK5105.59 .S526 2007 005.8.

19.
Google hacking for penetration testers. volume 2 Johnny Long by
Publication details: Rockland, MA Syngress Pub. c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 025.04 LON.2.

20.
Hacker's challenge 2 : test your network security and forensic skills Mike Schiffman ... [et al.] by
Publication details: New York McGraw-Hill/Osborne c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SCH.

21.
Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions David Pollino ... [et al.] by
Publication details: New York McGraw-Hill c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 POL.

22.
How personal & internet security works Preston Gralla by
Publication details: Indianapolis, Ind. ; London Pearson Education [distributor], Que/Sams 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: HV6773 .G7245 2006 005.8.

23.
Implementing homeland security for enterprise IT Michael Erbschloe by
Publication details: Amsterdam ; Boston Elsevier, Digital Press 2004
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.8 ERB, ...

24.
Internet denial of service : attack and defense mechanisms Jelena Mirkovic ... [et al.] by
Publication details: Upper Saddle River, NJ Prentice Hall Professional Technical Reference c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MIR.

25.
Internet security : a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis by
Publication details: Amsterdam ; Boston Digital Press c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SPE.

26.
Internet security : hacking, counterhacking, and society [edited by] Kenneth Einar Himma by
Publication details: Boston, MA Jones and Bartlett Publishers c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HIM.

27.
Intrusion detection & prevention Carl Endorf, Dr. Eugene Schultz, Jim Mellander by
Publication details: New York McGraw-Hill/Osborne c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 END.

28.
IPSec : the new security standard for the Internet, intranets, and virtual private networks Naganand Doraswamy, Dan Harkins by
Edition: 2nd ed
Publication details: Upper Saddle River, NJ Prentice Hall PTR c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 DOR.

29.
ISA server 2004 unleashed Michael Noel by
Publication details: Indianapolis, IN SAMS c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 NOE.

30.
I-sAFE Internet life skills activities : reproducible projects on learning to safely handle life online, grades 9-12
Publication details: San Francisco, CA Jossey-Bass 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.68 JOS.

31.
I-sAFE Internet safety activities : reproducible projects for teachers and parents, grades K-8
Edition: 1st ed
Publication details: San Francisco, CA Jossey-Bass 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.678 JOY.

32.
I-way robbery : crime on the Internet William C. Boni and Gerald L. Kovacich by
Publication details: Oxford, UK ; Burlington, MA Butterworth-Heinemann c1999
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 BON.

33.
(SCTS) Symantec certified technical specialist : small business security study guide Nik Alston, Mike Chapple, and Kalani Kirk Hausman by
Publication details: Upper Saddle River, NJ Addison-Wesley c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 ALS.

34.
Internet cryptography Richard E. Smith by
Publication details: Boston, MA Addison Wesley 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.82 SMI.

35.
Internet cryptography Richard E. Smith by
Publication details: Boston, MA Addison Wesley c1997
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.82 SMI.

36.
Security threat mitigation and response : understanding Cisco security MARS Dale Tesch and Greg Abelar by
Publication details: Indianapolis, IN Cisco Press 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 TES.

37.
Security threat mitigation and response : understanding Cisco security MARS Dale Tesch and Greg Abelar by
Publication details: Indianapolis, IN Cisco Press c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 TAS.

38.
At Large: The Strange Case of the World's Biggest Internet Invasion David H Freedman; Charles C Mann by
Publication details: New York Simon & Schuster 1997
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.1680973 FRE.

39.
Security threat mitigation and response : understanding Cisco security MARS Dale Tesch and Greg Abelar by
Publication details: Indianapolis, IN Cisco Press 2007
Availability: No items available.

40.
Security threat mitigation and response : understanding Cisco security MARS Dale Tesch and Greg Abelar by
Publication details: Indianapolis, IN Cisco Press c2007
Availability: No items available.

Pages

Find us on the map

Powered by Koha