Your search returned 25 results.

Sort
Results
1.
Secure computers and networks Analysis, design, and implementation by Eric A Fisch and Gregory B White by
  • Fisch, Eric A
  • White, Gregory B
Material type: Text Book
Publication details: Boca Raton CRC Press 2000
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 P.

2.
Check Point NG VPN-1/FireWall-1 Advanced Configuration and Troubleshooting by
  • Noble, Jim
  • Maxwell, Doug
  • Hourihan, Kyle X
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 .

3.
Configuring ISA Server 2000 Building Firewalls for Windows 2000 by
  • Shinder, Thomas Grasdal, Martin, Shinder, Deb
Material type: Text Book
Publication details: Syngress Publishing 2000
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

4.
Configuring Symantec AntiVirus Corporate Edition by
  • Shimonski, Robert J. Kahn, Athar A, Hunter, Laura E
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

5.
CURRENT SECURITY MANAGEMENT & ETHICAL ISSUES OF INFORMATION TECHNOLOGY by
  • Azari, Rasool
Material type: Text Book
Publication details: Idea Group Inc. 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

6.
Cyber Adversary Characterization Auditing the Hacker Mind by
  • Parker, Tom Shaw, Eric, Sachs, Marcus H
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 .

7.
Dr. Tom Shinder's Configuring ISA Server 2004 by
  • Shinder, Thomas, Littlejohn, Shind
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.7/1376 .

8.
Hack Proofing Windows 2000 Server Security by
  • Todd, Chad, Johnson, Norris L
Material type: Text Book
Publication details: Syngress Publishing 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

9.
Invasion of Privacy Big Brother and the Company Hackers by
  • Weber, Michael
Material type: Text Book
Publication details: Course PTR 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 323.4/483 .

10.
IT Solutions Series Information Technology Security:Advice from Experts by
  • Oliva, Lawrence
Material type: Text Book
Publication details: Idea Group Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 658.47 .

11.
Network Interdiction and Stochastic Integer Programming by
  • Woodruff, David L
Material type: Text Book
Publication details: Kluwer Academic Publishers 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

12.
Windows(R) XP Professional Security by
  • Weber, Chris, Bahadur, Gary
Material type: Text Book
Publication details: McGraw-Hill Osborne 2002
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

13.
Check Point NG VPN-1/FireWall-1 Advanced Configuration and Troubleshooting by
  • Noble, Jim Hourihan, Kyle X, Maxwell, Doug
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

14.
Configuring ISA Server 2000 Building Firewalls for Windows 2000 by
  • Shinder, Thomas Grasdal, Martin, Shinder, Deb
Material type: Text Book
Publication details: Syngress Publishing 2000
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

15.
Configuring Symantec AntiVirus Corporate Edition by
  • Shimonski, Robert J. Kahn, Athar A, Hunter, Laura E
Material type: Text Book
Publication details: Syngress Publishing 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

16.
CURRENT SECURITY MANAGEMENT & ETHICAL ISSUES OF INFORMATION TECHNOLOGY by
  • Azari, Rasool
Material type: Text Book
Publication details: Idea Group Inc. 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 5.8 .

17.
Cyber Adversary Characterization Auditing the Hacker Mind by
  • Parker, Tom Shaw, Eric, Sachs, Marcus H
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 .

18.
Dr. Tom Shinder's Configuring ISA Server 2004 by
  • Shinder, Thomas, Littlejohn, Shind
Material type: Text Book
Publication details: Syngress Publishing 2004
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.7/1376 .

19.
Hack Proofing Windows 2000 Server Security by
  • Todd, Chad, Johnson, Norris L
Material type: Text Book
Publication details: Syngress Publishing 2001
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 4.6 .

20.
Invasion of Privacy Big Brother and the Company Hackers by
  • Weber, Michael
Material type: Text Book
Publication details: Course PTR 2003
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 323.4/483 .

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2023. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832

Powered by Koha