Logo Politeknik Seberang Perai
1. Book LAN times guide to security and data integrity

by Farley, Marc; Hsu, Jeffrey; Stearns, Tom.

Publisher: Berkeley : Osborne McGraw-Hill, 1996Availability: Copies available for loan: [TK5105.59.F37 1996 ] (1). Actions: Add to cart
2. Book Designing network security

by Kaeo, Merike.

Publisher: Indianapolis : Cisco Systems, 1999Availability: Copies available for loan: [TK5105.59.K34 1999 ] (5). Actions: Add to cart
3. Book Cisco Secure intrusion detection system

by Carter, Earl.

Publisher: Indianapolis,USA : Cisco Press, 2002Availability: Copies available for loan: [TK 5105.59 C38 2002 ] (1). Actions: Add to cart
4. Book with CD Network security 1 and 2 companion guide

by Rufi, Antoon W.

Publisher: Indiana : Cisco Press, 2007Availability: Copies available for loan: [TK5105359 R837 2007 ] (1). Copies available for reference: [TK5105359 R837 2007] (1 ).
Actions: Add to cart
5. Book Computer security fundamentals

by Easttom, Chuck.

Publisher: Upper Saddle River,New Jersey : Pearson education, 2006Availability: Copies available for loan: [QA76.9 E325 2006 ] (1). Actions: Add to cart
6. Book Inside network perimeter security

by Northcutt, Stephen.

Edition: 2nd.ed. Publisher: Indianapolis,Indiana Sams, 2005Availability: Copies available for loan: [TK5105.59 I53 2005 ] (1). Actions: Add to cart
7. Book Network security fundamentals

by Laet, Gert De; Schauwers, Gert.

Publisher: Indiana : Cisco Press, 2005Availability: Copies available for loan: [TK5105.59 L32 2005 ] (1). Actions: Add to cart
8. Book Java network security

by Macgregor, Robert.

Publisher: Upper Saddle River, New Jersey : Prentice Hall, 1998Availability: Copies available for loan: [QA76.73.J38J378 1998 ] (5). Copies available for reference: [QA76.73.J38 J378 1998 ] (3 ).
Actions: Add to cart
9. Book Enterprise security

by Newman, Robert C.

Publisher: New Jersey : Pearson Education, 2003Availability: Copies available for loan: [HF5548.32 N49 2003 ] (2). Actions: Add to cart
10. Book Hacker's challenge : 20 brand-new forensic scenarios & solutions

by Pollino, David.

Publisher: New York : McGraw-Hill, 2006Availability: Copies available for loan: [QA76.9 H322 2006 ] (2). Copies available for reference: [QA76.9 H322 2006 ] (1 ).
Actions: Add to cart
11. Book Principles of information systems security : text and cases

by Dhillon, Gurpreet.

Publisher: New Jersey : John Wiley & Sons, 2007Availability: Copies available for loan: [QA76.9.A25 D55 2007 ] (1). Actions: Add to cart
12. Book Network security : how to plan for it and achieve it

by Baker, Richard H.

Publisher: New York : McGraw-Hill, 1995Availability: Copies available for loan: [TK5105.5 B3337 1995] (3). Copies available for reference: [TK5105.5 B337 1995] (1 ).
Actions: Add to cart
13. Book Network security

by Pardoe, Terry D; Snyder, Gordon F.

Publisher: New York : Thomson Delmar Learning, 2005Availability: Copies available for loan: [TK5105.59 P38 2005 ] (2). Actions: Add to cart
14. Book Local area network management, design and security : a practical approach

by Mikalsen, Arne; Borgesen, Per.

Publisher: New York : John Wiley & Sons, 2002Availability: Copies available for loan: [TK5105.7 M535 2002 ] (3). Actions: Add to cart
15. Book Network security architectures

by Convery, Sean.

Publisher: Indianapolis, IN : Cisco Press, 2004Availability: Copies available for loan: [TK5105.59 C766 2004] (2). Copies available for reference: [TK5105.59 C766 2004] (1 ).
Actions: Add to cart
16. Book Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhem

by Walker, Andy (Andy G.).

Publisher: Indianapolis, Ind. : Que, c2009Online Access: Table of contents only Availability: Copies available for loan: [QA76.9.A25 W177 2009 ] (1). In transit (1). Actions: Add to cart
17. Book with CD Mike Meyers' CompTIA security+ certification

by Meyers, Michael; Samuelle, T. J.

Edition: 2nd ed.Publisher: New York : McGraw-Hill, c2009Other title: CompTIA security+ certification.Availability: Copies available for loan: [QA76.3.M612 2009] (2). Copies available for reference: [QA76.3.M612 2009] (2 ).
Actions: Add to cart
18. Book Network security essentials : applications and standards

by Stallings, William.

Publisher: Upper Saddle River, NJ : Prentice Hall, 1999Availability: Copies available for loan: [TK5105.59 .S725 1999] (4). Copies available for reference: [TK5105.59 .S725 1999] (1 ).
Actions: Add to cart
19. Journal/Magazine Articles Social media security : where do you end up sharing the least with strangers

by Magnus.

Source: PC.comPublisher: Petaling Jaya : Twenty First Century, 2000Availability: Journal/Magazine ArticlesQA76.8 I126P43 (1) Actions: Add to cart
No cover image available
20. Book Security+ guide to network security fundamentals

by Ciampa, Mark.

Edition: 3rd ed.Publisher: Boston : Course Technology Cengage Learning, 2009Availability: Copies available for reference: [TK5105.59 .C565 2009] (1 ). Actions: Add to cart
Powered by Koha. Content copyrighted by Perpustakaan Politeknik Seberang Perai © 2023