2561. Configuring Check Point NGX VPN-1/FireWall-1 by Stephens, Robert. Publication: Rockland, MA : Syngress Pub., 2005 . 1 online resource (xxx, 625) : , Includes index. Date:2005 Availability: No items available: Actions: Add to cart
2562. Securing IM and P2P applications for the enterprise   Publication: Rockland, MA : Syngress Pub., 2006 . 1 online resource (xxiv, 454 p.) : , Includes index. Date:2006 Availability: No items available: Actions: Add to cart
2563. How to cheat at managing windows server update services by Barber, Brian. Publication: Rockland, Mass. : Syngress, 2005 . 1 online resource (xxii, 369 p.) : , Includes index. Date:2005 Availability: No items available: Actions: Add to cart
2564. Insider threat by Cole, Eric. Publication: Rockland, Mass. : | Oxford : Syngress ; | Elsevier Science [distributor], 2006 . 1 online resource (1 v.) : , Includes index. Date:2006 Availability: No items available: Actions: Add to cart
2565. Writing security tools and exploits by Foster, James C. Publication: Rockland, MA : Syngress, 2006 . 1 online resource. Date:2006 Availability: No items available: Actions: Add to cart
2566. Perfect passwords by Burnett, Mark. Publication: Rockland, Mass. : Syngress, 2006 . 1 online resource (xv, 181 p.) : Date:2006 Availability: No items available: Actions: Add to cart
2567. How to cheat at managing Microsoft Operations Manager 2005   Publication: Rockland, MA : Syngress, 2006 . 1 online resource. Date:2006 Availability: No items available: Actions: Add to cart
2568. SAS� intelligence platform   Publication: Cary, NC : SAS Pub., 2006 . 1 online resource. Date:2006 Availability: No items available: Actions: Add to cart
2569. Practical VoIP security   Publication: Rockland, MA : Syngress Pub., 2006 . 1 online resource. , Includes index. Date:2006 Availability: No items available: Actions: Add to cart
2570. The description logic handbook   Publication: Cambridge, UK ; | New York : Cambridge University Press, 2003 . 1 online resource (xvii, 555 p.) : Date:2003 Availability: No items available: Actions: Add to cart
2571. Principles of constraint programming by Apt, Krzysztof R., Publication: Cambridge ; | New York : Cambridge University Press, 2003 . 1 online resource (xii, 407 p.) : Date:2003 Availability: No items available: Actions: Add to cart
2572. Satisficing games and decision making by Stirling, Wynn C. Publication: Cambridge, England ; | New York : Cambridge University Press, 2003 . 1 online resource (xvii, 249 p.) : Date:2003 Availability: No items available: Actions: Add to cart
2573. Genomic Perl by Dwyer, Rex A., Publication: Cambridge, UK ; | New York : Cambridge University Press, 2003 . 1 online resource (xvii, 334 pages) : Date:2003 Availability: No items available: Actions: Add to cart
2574. Programmer's ultimate security deskref by Foster, James C. Publication: Rockland, MA : Syngress Pub., 2004 . 1 online resource. , Title from e-book title screen (viewed Oct. 26, 2004). Date:2004 Availability: No items available: Actions: Add to cart
2575. Internet counts   Publication: Washington, D.C. : National Academy Press, 1998 . 1 online resource (vii, 97 p.) Date:1998 Availability: No items available: Actions: Add to cart
2576. Macromedia Fireworks MX fast & easy Web development by Singhal, Yesh. Publication: [Cincinnati, Ohio] : Premier Press, 2002 . 1 online resource (xiv, 320 p.) : , Includes index. Date:2002 Availability: No items available: Actions: Add to cart
2577. A professional's guide to data communication in a TCP/IP world by Carne, E. Bryan, Publication: Boston : Artech House, 2004 . 1 online resource (xv, 253 p.) : Date:2004 Availability: No items available: Actions: Add to cart
2578. Grid computing for electromagnetics by Tarricone, Luciano. Publication: Boston : Artech House, 2004 . 1 online resource (xviii, 246 p.) : Date:2004 Availability: No items available: Actions: Add to cart
2579. Privacy protection and computer forensics by Caloyannides, Michael A. Publication: Boston : Artech House, 2004 . 1 online resource (xix, 345 p.) : , Rev. ed. of: Computer forensics and privacy. 2001. Date:2004 Availability: No items available: Actions: Add to cart
2580. Outsourcing information security by Axelrod, C. Warren. Publication: Boston : Artech House, 2004 . 1 online resource (xxvi, 248 p.) : Date:2004 Availability: No items available: Actions: Add to cart