1 2 3 4 5 6 7 8 9 10 Next >>
1. Network security technologies /   Publication: Boca Raton, Fl. : Auerbach Pub., 2005 . xx, 273 p. : Date:2005 Availability: Copies available: Tain Campus Science & Technology [TK5105.59 F85 2005] (2), Actions: Add to cart
2. Fundamentals of network security /   Publication: Boston : Artech House, 2001 . xx, [324] p. : Date:2001 Availability: Copies available: Tain Campus [QA76.9 A25 C36] (1), Actions: Add to cart
3. Hacking exposed :   Publication: New ?York : McGraw-Hill, 2005 . xxiii, 692 p. : Date:2005 Availability: Copies available: Turkeyen Campus Reserved Collection [TK5105.59 M33 2005] (1), Turkeyen Campus Science & Technology [TK5105.59 M33 2005] (2), Actions: Add to cart
4. Network security essentials :   Publication: Upper Saddle River, N.J. : Pearson Education, 2007 . xvi, 413 p. : Date:2007 Availability: Copies available: Turkeyen Campus Reserved Collection [TK5105.59 S725 2007] (1), Actions: Add to cart
5. Principles of information security /   Publication: Australia : Thomson Course Technology, 2005 . xxiii, 576 p. : Date:2005 Availability: Copies available: Turkeyen Campus Science & Technology [TK5105.59 W55 2005] (2), Actions: Add to cart
6. Essential Check Point FireWall-1 :   Publication: Boston : Addison-Wesley, 2002 . xxiii, 519 p. : 24 cm. Date:2002 Availability: Copies available: Turkeyen Campus Science & Technology [TK5105.59 W46] (1), Actions: Add to cart
7. Security transformation :   Publication: New York, N.Y. : McGraw-Hill, 2001 . xii, 211 p. : Date:2001 Availability: Copies available: Turkeyen Campus Social Sciences [HD30.38 M32] (1), Actions: Add to cart
8. Implementing intrusion detection systems :   Publication: Indianapolis, IN : Wiley Pub., 2003 . [xviii], 316 p. : Date:2003 Availability: Copies available: Tain Campus Science & Technology [TK5105.59 C76] (1), Actions: Add to cart
9. Robust control system networks by Langner, Ralph. Publication: New York : Momentum Press, 2012 . 1 online resource (xiii, 206 p.) : Date:2012 Availability: No items available: Actions: Add to cart
10. Nmap 6 by Pale, Paulino Calderon. Publication: Birmingham : Packt Pub., 2012 . 1 online resource (1 v.) : , "Quick answers to common problems"--Cover. | "A complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administrators"--Cover. Date:2012 Availability: No items available: Actions: Add to cart
11. Security in distributed and networking systems   Publication: Singapore ; | Hackensack, NJ : World Scientific, 2007 . 1 online resource (xvi, 493 p.) : Date:2007 Availability: No items available: Actions: Add to cart
12. Spring Security 3.1 by Winch, Robert. Publication: Birmingham : Packt Pub., 2012 . 1 online resource (950 p.) , Configuring JdbcUserDetailsManager to use groups. Date:2012 Availability: No items available: Actions: Add to cart
13. BackTrack 5 Cookbook : by Pritchett, Willie. Publication: Birmingham : Packt Pub., 2012 . 1 online resource (496 p.) Date:2012 Availability: No items available: Actions: Add to cart
14. Everything you need to know about performing a network risk analysis by Beachy, Rob. Publication: [S.l.] : BrainMass Inc., 2012 . 1 online resource : , Title from PDF title page (viewed on Mar. 14, 2013). Date:2012 Availability: No items available: Actions: Add to cart
15. End user information security policy template by Beachy, Rob. Publication: [S.l.] : BrainMass Inc., 2012 . 1 online resource. , Title from PDF title page (viewed on Mar. 14, 2013). Date:2012 Availability: No items available: Actions: Add to cart
16. CISSP exam prep   Publication: Washington, D.C. : SSI Logic, 2012 . 1 online resource. , Title from title screen. Date:2012 Availability: No items available: Actions: Add to cart
17. Penetration testing by Henry, Kevin M. Publication: Ely, Cambridgeshire, U.K. : IT Governance Pub., 2012 . 1 online resource. , Title from title screen. Date:2012 Availability: No items available: Actions: Add to cart
18. International seminar on nuclear war and planetary emergencies   Publication: New Jersey : World Scientific, 2012 . 1 online resource (x, 604 p.) Date:2012 Availability: No items available: Actions: Add to cart
19. Best practices in computer network defense :   Publication: . 1 online resource. , International conference proceedings. Availability: No items available: Actions: Add to cart
20. Use of risk analysis in computer-aided persuasion   Publication: Amsterdam ; | Washington, D.C. : IOS Press, 2011 . 1 online resource (viii, 337 p.) , "Proceedings of the NATO Advanced Research Workshop on The Use of Risk Analysis to Protect Against Intelligent Threats, Antalya, Turkey, 24-26 May 2011"--T.p. verso. | International conference proceedings. | Includes indexes. Date:2011 Availability: No items available: Actions: Add to cart
1 2 3 4 5 6 7 8 9 10 Next >>