|
|
1. |
|
Designing network security
by Kaeo, Merike.
Publisher: Indianapolis : Cisco Systems, 1999Availability: Copies available for loan: [TK5105.59.K34 1999 ] (5).
Actions:
Add to cart (remove)
|
|
|
2. |
|
Computer security fundamentals
by Easttom, Chuck.
Publisher: Upper Saddle River,New Jersey : Pearson education, 2006Availability: Copies available for loan: [QA76.9 E325 2006 ] (1).
Actions:
Add to cart (remove)
|
|
|
3. |
|
Java network security
by Macgregor, Robert.
Publisher: Upper Saddle River, New Jersey : Prentice Hall, 1998Availability: Copies available for loan: [QA76.73.J38J378 1998 ] (5). Copies available for reference: [QA76.73.J38 J378 1998 ] (3 ).
Actions:
Add to cart (remove)
|
|
|
4. |
|
Principles of information systems security : text and cases
by Dhillon, Gurpreet.
Publisher: New Jersey : John Wiley & Sons, 2007Availability: Copies available for loan: [QA76.9.A25 D55 2007 ] (1).
Actions:
Add to cart (remove)
|
|
|
5. |
|
Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhem
by Walker, Andy (Andy G.).
Publisher: Indianapolis, Ind. : Que, c2009Online Access: Table of contents only Availability: Copies available for loan: [QA76.9.A25 W177 2009 ] (1). In transit (1).
Actions:
Add to cart (remove)
|
|
|
6. |
|
Mike Meyers' CompTIA security+ certification
by Meyers, Michael;
Samuelle, T. J.
Edition: 2nd ed.Publisher: New York : McGraw-Hill, c2009Other title: CompTIA security+ certification.Availability: Copies available for loan: [QA76.3.M612 2009] (2). Copies available for reference: [QA76.3.M612 2009] (2 ).
Actions:
Add to cart (remove)
|
|
|
7. |
|
Network security essentials : applications and standards
by Stallings, William.
Publisher: Upper Saddle River, NJ : Prentice Hall, 1999Availability: Copies available for loan: [TK5105.59 .S725 1999] (4). Copies available for reference: [TK5105.59 .S725 1999] (1 ).
Actions:
Add to cart (remove)
|
|
|
8. |
|
Principles of information security
by Whitman, Michael E;
Mattord, Herbert J.
Edition: Fifth editionAvailability: Copies available for loan: [TK5105.59 .W54 2016] (1).
Actions:
Add to cart (remove)
|
|
|
9. |
|
APPLIED INFORMATION SECURITY : A Hands-On Guide to Information Security Software
by Boyle, Randall.
Edition: 1st ed.Availability: Copies available for reference: [QA76.9.A25 .B792 2010] (1 ).
Actions:
Add to cart (remove)
|
|
|
10. |
|
Security intelligence : a practitioner's guide to solving enterprise security challenges
by Li, Qing;
Clark, Gregory.
Availability: Copies available for reference: [TK5105.59 .L52 2015] (1 ).
Actions:
Add to cart (remove)
|
|
|
11. |
|
The network security test lab : a step by step guide
by Gregg, Michael.
Availability: Copies available for reference: [TK5105.59 .G819 2015] (1 ).
Actions:
Add to cart (remove)
|
|
|
12. |
|
Integrated Security Technologies and Solutions - Volume 1 : Cisco security solutions for advanced threat protection with next generation firewall, intrusion prevention, AMP, and content security
by Woland, Aaron;
Santuka, Vivek;
Harris, Mason;
Sanbower, Jamie.
Availability: Copies available for loan: [TK5105.59 .W848 2018] (1).
Actions:
Add to cart (remove)
|
|
|
13. |
|
Computer security : principles and practice
by Stallings, William;
Brown, Lawrie.
Edition: Pearson International EditionAvailability: Copies available for loan: [QA76.9.A25 S685 2018] (1).
Actions:
Add to cart (remove)
|
|
|
14. |
|
Security in the Digital World
by Day, Graham.
Publisher: Cambridgeshire, UK IT Governance Publishing 2017Availability: Copies available for loan: [QA76.9.A25 D39 2017] (1).
Actions:
Add to cart (remove)
|
|