Search again

Found: 15  Titles

Order by :    Show:   Per Page
image

image

image
GFI network security and PCI compliance power tools Brien Posey ; Troy Thompson, technical editor ; foreword by Laura Taylor.
Author
Posey, Brien.
Published
Burlington, MA : Syngress Pub, 2009.
Call Number
005.8,e-book

image

image
Security breaches and threat prevention in the internet of things N. Jeyanthi and R. Thandeeswaran, editors.
Published
Hershey, PA : Information Science Reference, [2017].
Call Number
005.8,e-book

image
Security for Microsoft Windows System Administrators introduction to key information security concepts / Derrick Rountree.
Author
Rountree, Derrick.
Published
Rockland, Mass. : Syngress ; Oxford : Elsevier Science [distributor], 2010.
Call Number
005.8,e-book

image
Seven deadliest Microsoft attacks Rob Kraus [and others].
Published
Amsterdam ; Boston : Syngress/Elsevier, c2010.
Call Number
005.8,e-book

image
Seven deadliest network attacks Stacy Prowell, Rob Kraus, Mike Borkin.
Author
Prowell, Stacy J.
Published
Amsterdam ; Boston : Syngress, c2010.
Call Number
005.8,e-book

image
Seven deadliest USB attacks Brian Anderson, Barbara Anderson ; technical editor, Andrew Rabie.
Author
Anderson, Brian
Published
Burlington, MA : Syngress, c2010.
Call Number
005.8,e-book

image
Seven deadliest web application attacks Mike Shema.
Author
Shema, Mike.
Published
Amsterdam ; Boston : Syngress/Elsevier Science, c2010.
Call Number
005.8,e-book

image
Seven deadliest wireless technologies attacks Brad Haines ; technical editor, Tim Kramer.
Author
Haines, Brad.
Published
Burlington, MA : Syngress/Elsevier, c2010.
Call Number
005.8,e-book

image
System assurance beyond detecting vulnerabilities / Nikolai Mansourov, Djenana Campara.
Author
Mansourov, Nikolai.
Published
San Francisco, Calif. : Morgan Kaufmann ; Oxford : Elsevier Science [distributor], 2010.
Call Number
005.8,e-book

image
The official CHFI exam 312-49 study guide for computer hacking forensics investigators.
Published
Burlington, MA : Syngress Pub., c2007.
Call Number
005.8,e-book

image
UTM security with Fortinet Mastering FortiOS / Kenneth Tam [and others].
Published
[Place of publication not identified] : Syngress, 2013.
Call Number
005.8,e-book

image
Wireless security models, threats, and solutions / Randall K. Nichols, Panos C. Lekkas.
Author
Nichols, Randall K.
Published
New York : McGraw-Hill, [2002].
Call Number
005.8,e-book

Search Tools: Get RSS Feed

เว็บไซต์นี้ มีการเก็บข้อมูลการใช้งานเว็บไซต์ (Cookies) เพื่อมอบบริการที่ดีที่สุดสำหรับคุณ โดยการเข้าใช้งานเว็บไซต์ ถือเป็นการยอมรับใน นโยบายคุกกี้ (Cookies Policy) | นโยบายส่วนบุคคล (Privacy Policy) ตกลง

Style Switcher
Theme Colors

Layout Styles