Your search returned 243 results.

Not what you expected? Check for suggestions
|
How to cheat at managing information security [electronic resource] / Mark Osborne ; Paul M. Summitt, technical editor.

by Osborne, Mark | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, 2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Designing and building enterprise DMZs [electronic resource] / Hal Flynn.

by Flynn, Hal | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Firewall policies and VPN configurations [electronic resource] / Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell.

by Cantrell, Chris | Henmi, Anne | Lucas, Mark | Singh, Abhishek | ebrary, Inc.

Publisher: Rockland, MA : Syngress, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Aspects of network and information security [electronic resource] / edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian.

by NATO Advanced Study Institute on Network Security and Intrusion Detection (2005 : Yerevan, Armenia) | Haroutunian , Evgueni | Kranakis, Evangelos | Shahbazian, E. (Elisa) | NATO Science for Peace and Security Programme | North Atlantic Treaty Organization. Public Diplomacy Division | ebrary, Inc.

Publisher: Amsterdam ; Washington D.C. : IOS Press, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Enemy at the water cooler [electronic resource] : real-life stories of insider threats and Enterprise Security Management countermeasures / Brian T. Contos.

by Contos, Brian T | ebrary, Inc.

Publisher: Rockland, MA : Syngress, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Cisco security specialist's guide to PIX Firewall [electronic resource] / Vitaly Osipov.

by Osipov, Vitaly | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Pub., c2002Other title: PIX Firewall.Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Nokia Network security [electronic resource] : solutions handbook / Doug Maxwell.

by Maxwell, Douglas D | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Pub., c2002Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Cryptography and network security / Atul Kahate.

by Kahate, Atul.

Publisher: New Delhi : Tata McGraw-Hill, c2003Availability: Items available for loan: [Call number: 005.82 KAH] (1).
Snort 2.0 intrusion detection [electronic resource] / Jay Beale, James C. Foster.

by Beale, Jay | Foster, James C | ebrary, Inc.

Publisher: Rockland : Oxford : Syngress ; Elsevier Science, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Security of e-systems and computer networks / Mohammad Obaidat, Noureddine Boudriga.

by Obaidat, Mohammad S. (Mohammad Salameh), 1952- | Boudriga, Noureddine.

Publisher: Cambridge : Cambridge University Press, 2007Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 OBA 2007] (1).
Security for Web services and service-oriented architectures / Elisa Bertino ... [et al.].

by Bertino, Elisa.

Publisher: Heidelberg ; New York : Springer, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SEC 2010] (1).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 5th ed.Publisher: Boston, MA : Prentice Hall, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2011] (2).
Special ops [electronic resource] : host and Network security for Microsoft, UNIX, and Oracle / by Erik Pace Birkholz.

by Birkholz, Erik Pace | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Host integrity monitoring [electronic resource] : using Osiris and Samhain / Brian Wotring ; Bruce Potter, technical editor ; for[e]word by Marcus J. Ranum.

by Wotring, Brian | Potter, Bruce | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Pub., c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Network interdiction and stochastic integer programming [electronic resource] / edited by David L. Woodruff.

by Woodruff, David L | ebrary, Inc.

Publisher: Boston : Kluwer Academic Publishers, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Nessus network auditing [electronic resource] / Jay Beale.

by Beale, Jay | ebrary, Inc.

Publisher: Rockland, MA : Syngress, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Toward a safer and more secure cyberspace [electronic resource] / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.

by Goodman, Seymour E | Lin, Herbert | ebrary, Inc | National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States.

Publisher: Washington, DC : National Academies Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Security data visualization [electronic resource] : graphical techniques for network analysis / Greg Conti.

by Conti, Greg | ebrary, Inc.

Publisher: San Francisco : No Starch Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Cyber adversary characterization [electronic resource] : auditing the hacker mind / Tom Parker ... [et al.] ; foreword by Jeff Moss.

by Parker, Tom | ebrary, Inc.

Publisher: Rockland, MA : Syngress, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Buffer overflow attacks [electronic resource] : detect, exploit, prevent / James C. Foster, Vitaly Osipov, Nish Bhalla, Neils Heinen.

by Foster, James C | Bhalla, Nish | Heinen, Neils | Osipov, Vitaly | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).