Your search returned 140 results.

Sort
Results
61.
Snort 2.0 Intrusion Detection by
  • Beale, Jay Posluns, Jeffrey, Foster, James C
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

62.
Snort 2.1 Intrusion Detection by
  • Caswell, Brian, Beale, Jay
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 .

63.
Strategic Information Security by
  • Wylder, John
Material type: Text Book
Publication details: Auerbach Publishers, Incorporated 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 658.5 .

64.
WarDriving Drive, Detect, Defend:a Guide to Wireless Security by
  • Hurley, Chris
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

65.
Advances in Information Security Management & Small Systems Security by
  • Eloff, Jan H. P
Material type: Text Book
Publication details: Kluwer Academic Publishers 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 658.0558 P01.

66.
CCSA CP2000 by
  • Stovall, Les
Material type: Text Book
Publication details: Coriolis Group, LLC, The 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

67.
Check Point Next Generation Security Administration by
  • Amon, Cherie Simonis, Drew, Kligerman, Daniel
Material type: Text Book
Publication details: Syngress Publishing 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: QA76.9.A25.C454 2002beb.

68.
Check Point NG VPN-1/FireWall-1 Advanced Configuration and Troubleshooting by
  • Noble, Jim Hourihan, Kyle X, Maxwell, Doug
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

69.
Computers at Risk Safe Computing in the Information Age by
  • National Research Council Staff
Material type: Text Book
Publication details: National Academies Press 1990
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

70.
Configuring ISA Server 2000 Building Firewalls for Windows 2000 by
  • Shinder, Thomas Grasdal, Martin, Shinder, Deb
Material type: Text Book
Publication details: Syngress Publishing 2000
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

71.
Configuring Symantec AntiVirus Corporate Edition by
  • Shimonski, Robert J. Kahn, Athar A, Hunter, Laura E
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

72.
Crackproof Your Software Protect Your Software Against Crackers by
  • Cerven, Pavol
Material type: Text Book
Publication details: No Starch Press 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

73.
CURRENT SECURITY MANAGEMENT & ETHICAL ISSUES OF INFORMATION TECHNOLOGY by
  • Azari, Rasool
Material type: Text Book
Publication details: Idea Group Inc. 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

74.
Cyber Adversary Characterization Auditing the Hacker Mind by
  • Parker, Tom Shaw, Eric, Sachs, Marcus H
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 .

75.
Data Privacy in the Information Age by
  • Klosek, Jacqueline
Material type: Text Book
Publication details: Greenwood Publishing Group, Incorporated 2000
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

76.
Disaster Proofing Information Systems by
  • Buchanan, Robert W
Material type: Text Book
Publication details: McGraw-Hill Professional Publishing 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8/6 .

77.
Dr. Tom Shinder's Configuring ISA Server 2004 by
  • Shinder, Thomas, Littlejohn, Shind
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.7/1376 .

78.
ExamInsight For CompTIA Security+ Certification (SY0-101) Second Edition by
  • Houser, Tcat, O'Boyle, Helen
Material type: Text Book
Publication details: TotalRecall Publications 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 4.16 .

79.
ExamWise For CompTIA Security+ Examination (SY0-101) by
  • Houser, Tcat, O'Boyle, Helen
Material type: Text Book
Publication details: TotalRecall Publications 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 4.16 .

80.
Executive's Guide to Privacy Management by
  • Erbschloe, Michael
Material type: Text Book
Publication details: McGraw-Hill Trade 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 658.4/78 .

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2023. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832

Powered by Koha