Your search returned 24 results.

Sort
Results
Best Damn Windows server 2003 Period Book Susan Snedaker

by Snedaker, Susan.

Publication details: Rockland Syngress Publishing 2004Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: QA 76.67.W56 Sne.

Best damn firewall book period Thomas W. Shinder...[et al.]

by Shinder, Thomas W.

Publication details: Rockland, MA Syngress 2003Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: TK 5105.59.B466.

Designing a wireless network

by McCullough, Andy | Wheat, Jeffrey | Tucker, Jackie.

Publication details: Rockland, MA. Syngress 2001Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: TK 6550 Des.

E-mail virus protection handbook

by Russell, Ryan.

Publication details: Rockland, MA Syngress Publishing 2000Other title: Brian Bagnall.Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: HE 6239.E54 Bag.

Google hacking for penetration testers Johnny Long

by Long, Johnny.

Publication details: Rockland, MA Syngress 2005Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: TK 5105.885 Lon.

Hack proofing your web applications edited by Jeff Forristal

by Traxler, Julie | Forristal, Jeff.

Publication details: Rockland, M.A. Syngress 2001Other title: the only way to stop a Hacker is to think like one.Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: QA 76.8.W42 Hac.

Hack proofing: Sun Solaris 8 Wyman Miles...[and others]

by Miles, Wyman.

Publication details: Rockland, MA Syngress 2001Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: QA 76.9.A25 Hac.

Hack proofing LINUX [cd-rom]

by Danielyan, Edgar | Stanger, James, Ph.D.

Publication details: Rockland, MA Syngress Publishing 2001Other title: a guide to open source security.Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: CD/QA 76.73.L5 Sta.

Hack proofing LINUX

by Danielyan, Edgar | Stanger, James, Ph.D.

Publication details: Rockland, MA Syngress Publishing 2001Other title: a guide to open source security.Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: QA 76.73.L5 Sta.

How to cheat at managing information security. by Mark Osborne

by Osborne, Mark.

Publication details: Rockland, MA Syngress 2006Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: QA 76.6.A25 Osb.

Information security risk assessment toolkit: practical assessment through data collection and data analysis. By Mark Ryan M. Talabis, [and] Jason L. Martin

by Talabis, Mark Ryan M | Martin, Jason L.

Publication details: Amsterdam Syngress 2013Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: QA 76.9.A25 Tal.

Managing catastrophic loss of sensitive data: a guide for IT and security professionals by Constantine Photopoulos

by Photopoulos, Constantine.

Publication details: Oxford: Syngress 2008Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: QA 76.9.D314 Pho.

Mission critical: internet security

by Dunsmore, Bradley.

Publication details: Rockland, MA Syngress 2001Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: TK 5105.875.I57 Dun.

Specilal OPS: host and network security for Microsoft, UNIX, and ORACLE

by Birkholz, Erik Pace.

Publication details: Rockland, MA Syngress 2003Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: TK 5105.59 Bir.

The wireshark field guide: analyzing and troubleshooting network traffic By Robert Shimonski

by Shimonski, Robert.

Publication details: Amsterdam: Syngress 2013Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: TK 5105.5 Shi.

Windows server 2012 security from end to end to edge and beyond: architecting, designing, and deploying windows server 2012 security solutions by Thomas W Shinder, Yuri Diogenes and Debra L. Shinder

by Diogenes, Yuri | Shinder, Thomas W | Shinder, D.L.

Publication details: Amsterdam Syngress Publications 2013Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: QA 76.774.M434 Shi.

Windows 2000: network services

by Hinkle, Tony | Shinder, D.L.

Publication details: Rockland Syngress Media 2000Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: QA 76.76.W56 Shi.

Windows 2000

by Collians, Brian M | Weiss, Martin.

Publication details: Rockland, MA Syngress Media 2000Other title: configuration wizards.Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: QA 76.76.C96 Col.

Writing security tools and exploits James C. Foster; Vincent Liu

by Foster, James C | Liu, Vincent.

Publication details: Rockland Syngress 2006Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: QA 76.9.A25 Fos.

Deploying windows 2000 with support tools

by Rosenfeld, Garry | Neale, Eriq Oliver.

Publication details: Rockland, MA Syngress Media 2000Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (2) . Collection(s): Call number: QA 76.76.W56 Ros.

Pages
Not finding what you're looking for?