Your search returned 140 results.

Sort
Results
21.
CCSA CP2000 by
  • Stovall, Les
Material type: Text Book
Publication details: Coriolis Group, LLC, The 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

22.
Check Point Next Generation Security Administration by
  • Amon, Cherie Simonis, Drew, Kligerman, Daniel
Material type: Text Book
Publication details: Syngress Publishing 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: QA76.9.A25.C454 2002beb.

23.
Check Point NG VPN-1/FireWall-1 Advanced Configuration and Troubleshooting by
  • Noble, Jim
  • Maxwell, Doug
  • Hourihan, Kyle X
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 .

24.
Computers at Risk Safe Computing in the Information Age by
  • National Research Council Staff
Material type: Text Book
Publication details: National Academies Press 1990
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

25.
Configuring ISA Server 2000 Building Firewalls for Windows 2000 by
  • Shinder, Thomas Grasdal, Martin, Shinder, Deb
Material type: Text Book
Publication details: Syngress Publishing 2000
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

26.
Configuring Symantec AntiVirus Corporate Edition by
  • Shimonski, Robert J. Kahn, Athar A, Hunter, Laura E
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

27.
Crackproof Your Software Protect Your Software Against Crackers by
  • Cerven, Pavol
Material type: Text Book
Publication details: No Starch Press 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

28.
CURRENT SECURITY MANAGEMENT & ETHICAL ISSUES OF INFORMATION TECHNOLOGY by
  • Azari, Rasool
Material type: Text Book
Publication details: Idea Group Inc. 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

29.
Cyber Adversary Characterization Auditing the Hacker Mind by
  • Parker, Tom Shaw, Eric, Sachs, Marcus H
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 .

30.
Data Privacy in the Information Age by
  • Klosek, Jacqueline
Material type: Text Book
Publication details: Greenwood Publishing Group, Incorporated 2000
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

31.
Disaster Proofing Information Systems by
  • Buchanan, Robert W
Material type: Text Book
Publication details: McGraw-Hill Professional Publishing 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8/6 .

32.
Dr. Tom Shinder's Configuring ISA Server 2004 by
  • Shinder, Thomas, Littlejohn, Shind
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.7/1376 .

33.
ExamInsight For CompTIA Security+ Certification (SY0-101) Second Edition by
  • Houser, Tcat, O'Boyle, Helen
Material type: Text Book
Publication details: TotalRecall Publications 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 4.6 .

34.
ExamWise For CompTIA Security+ Examination (SY0-101) by
  • Houser, Tcat, O'Boyle, Helen
Material type: Text Book
Publication details: TotalRecall Publications 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: .

35.
Executive's Guide to Privacy Management by
  • Erbschloe, Michael
Material type: Text Book
Publication details: McGraw-Hill Trade 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 658.4/78 .

36.
Finding and Fixing Vulnerabilities in Information Systems The Vulnerability Assessment and Mitigation Methodology by
  • Anton, Philip S. Mesic, Richard, Anderson, Robert H
Material type: Text Book
Publication details: Rand Corporation, The 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

37.
Hacking The Art of Exploitation by
  • Erickson, Jon
Material type: Text Book
Publication details: No Starch Press, Incorporated 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

38.
Hacking the Code ASP. NET Web Application Security by
  • Burnett, Mark
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 658.47 .

39.
Homeland Security Techniques and Technologies by
  • Mena, Jesus
Material type: Text Book
Publication details: Charles River Media 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 006.3/12 .

40.
Hack Proofing Cold Fusion 5.0 by
  • Casco, Steve Vaccaro, Dave, Meyer, Greg
Material type: Text Book
Publication details: Syngress Publishing 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 1.6425 .

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2023. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832

Powered by Koha