|
|
1. |
|
LAN times guide to security and data integrity
by Farley, Marc;
Hsu, Jeffrey;
Stearns, Tom.
Publisher: Berkeley : Osborne McGraw-Hill, 1996Availability: Copies available for loan: [TK5105.59.F37 1996 ] (1).
Actions:
Add to cart (remove)
|
|
|
2. |
|
Designing network security
by Kaeo, Merike.
Publisher: Indianapolis : Cisco Systems, 1999Availability: Copies available for loan: [TK5105.59.K34 1999 ] (5).
Actions:
Add to cart (remove)
|
|
|
3. |
|
Cisco Secure intrusion detection system
by Carter, Earl.
Publisher: Indianapolis,USA : Cisco Press, 2002Availability: Copies available for loan: [TK 5105.59 C38 2002 ] (1).
Actions:
Add to cart (remove)
|
|
|
4. |
|
Computer security fundamentals
by Easttom, Chuck.
Publisher: Upper Saddle River,New Jersey : Pearson education, 2006Availability: Copies available for loan: [QA76.9 E325 2006 ] (1).
Actions:
Add to cart (remove)
|
|
|
5. |
|
Inside network perimeter security
by Northcutt, Stephen.
Edition: 2nd.ed. Publisher: Indianapolis,Indiana Sams, 2005Availability: Copies available for loan: [TK5105.59 I53 2005 ] (1).
Actions:
Add to cart (remove)
|
|
|
6. |
|
Network security fundamentals
by Laet, Gert De;
Schauwers, Gert.
Publisher: Indiana : Cisco Press, 2005Availability: Copies available for loan: [TK5105.59 L32 2005 ] (1).
Actions:
Add to cart (remove)
|
|
|
7. |
|
Java network security
by Macgregor, Robert.
Publisher: Upper Saddle River, New Jersey : Prentice Hall, 1998Availability: Copies available for loan: [QA76.73.J38J378 1998 ] (5). Copies available for reference: [QA76.73.J38 J378 1998 ] (3 ).
Actions:
Add to cart (remove)
|
|
|
8. |
|
Enterprise security
by Newman, Robert C.
Publisher: New Jersey : Pearson Education, 2003Availability: Copies available for loan: [HF5548.32 N49 2003 ] (2).
Actions:
Add to cart (remove)
|
|
|
9. |
|
Hacker's challenge : 20 brand-new forensic scenarios & solutions
by Pollino, David.
Publisher: New York : McGraw-Hill, 2006Availability: Copies available for loan: [QA76.9 H322 2006 ] (2). Copies available for reference: [QA76.9 H322 2006 ] (1 ).
Actions:
Add to cart (remove)
|
|
|
10. |
|
Principles of information systems security : text and cases
by Dhillon, Gurpreet.
Publisher: New Jersey : John Wiley & Sons, 2007Availability: Copies available for loan: [QA76.9.A25 D55 2007 ] (1).
Actions:
Add to cart (remove)
|
|
|
11. |
|
Network security : how to plan for it and achieve it
by Baker, Richard H.
Publisher: New York : McGraw-Hill, 1995Availability: Copies available for loan: [TK5105.5 B3337 1995] (3). Copies available for reference: [TK5105.5 B337 1995] (1 ).
Actions:
Add to cart (remove)
|
|
|
12. |
|
Network security
by Pardoe, Terry D;
Snyder, Gordon F.
Publisher: New York : Thomson Delmar Learning, 2005Availability: Copies available for loan: [TK5105.59 P38 2005 ] (2).
Actions:
Add to cart (remove)
|
|
|
13. |
|
Local area network management, design and security : a practical approach
by Mikalsen, Arne;
Borgesen, Per.
Publisher: New York : John Wiley & Sons, 2002Availability: Copies available for loan: [TK5105.7 M535 2002 ] (3).
Actions:
Add to cart (remove)
|
|
|
14. |
|
Network security architectures
by Convery, Sean.
Publisher: Indianapolis, IN : Cisco Press, 2004Availability: Copies available for loan: [TK5105.59 C766 2004] (2). Copies available for reference: [TK5105.59 C766 2004] (1 ).
Actions:
Add to cart (remove)
|
|
|
15. |
|
Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhem
by Walker, Andy (Andy G.).
Publisher: Indianapolis, Ind. : Que, c2009Online Access: Table of contents only Availability: Copies available for loan: [QA76.9.A25 W177 2009 ] (1). In transit (1).
Actions:
Add to cart (remove)
|
|
|
16. |
|
Mike Meyers' CompTIA security+ certification
by Meyers, Michael;
Samuelle, T. J.
Edition: 2nd ed.Publisher: New York : McGraw-Hill, c2009Other title: CompTIA security+ certification.Availability: Copies available for loan: [QA76.3.M612 2009] (2). Copies available for reference: [QA76.3.M612 2009] (2 ).
Actions:
Add to cart (remove)
|
|
|
17. |
|
Network security essentials : applications and standards
by Stallings, William.
Publisher: Upper Saddle River, NJ : Prentice Hall, 1999Availability: Copies available for loan: [TK5105.59 .S725 1999] (4). Copies available for reference: [TK5105.59 .S725 1999] (1 ).
Actions:
Add to cart (remove)
|
|
|
18. |
|
Home Automation for DUMMIES
by Spivey, Dwight.
Availability: Copies available for loan: [TK7881.25 .S761 2015] (1).
Actions:
Add to cart (remove)
|
|
|
19. |
|
Integrated Security Technologies and Solutions - Volume 1 : Cisco security solutions for advanced threat protection with next generation firewall, intrusion prevention, AMP, and content security
by Woland, Aaron;
Santuka, Vivek;
Harris, Mason;
Sanbower, Jamie.
Availability: Copies available for loan: [TK5105.59 .W848 2018] (1).
Actions:
Add to cart (remove)
|
|
|
20. |
|
Computer security : principles and practice
by Stallings, William;
Brown, Lawrie.
Edition: Pearson International EditionAvailability: Copies available for loan: [QA76.9.A25 S685 2018] (1).
Actions:
Add to cart (remove)
|
|