My Library

   
Limit search to available items
13 results found. sorted by date .
Add Marked to Bag Add All On Page Add Marked to My Lists
Keywords (1-13 of 13)
1
Book
Book Cover

Guide to network defense and countermeasures


Weaver, Randy
Boston : Thomson/Course technology, 2007 2007

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W33 2007    Available
2
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Upper Saddle River, NJ. : Pearson International Education/Prentice Hall , 2007 2007

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S73 2007    Available
3
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Upper Saddle River, NJ. : Prentice Hall , 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S73 2003    Available
 Female Library  TK5105.59 S73 2003 c.2  Available
4
Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William
Upper Saddle River, N.J. : Prentice Hall International, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S713 2003    Available
 Female Library  TK5105.59 S713 2003 c.2  Available
 Male Library  TK5105.59 S713 2003    Available
There are additional copies/volumes of this item
5
Book
Book Cover

Network security principles and practices


Malik, Saadat
Indianapolis, Ind. : Cisco, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 M34 2003    Available
6
Book
Book Cover

Counter hack : a step-by-step guide to computer attacks and effective defenses


Skoudis, Ed
Upper Saddle River, N.J. : Prentice Hall PTR, 2002 2002

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S57 2002    Available
 Male Library  TK5105.59 S57 2002    Available
7
Book
Book Cover

Check point fire wall - 1 administration and CCSA study guide


Dangerfield, Steven
Upper Saddle River N.J. : Prentice Hall, 2002 2002

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9A25 D33 2002    Available
 Female Library  QA76.9A25 D33 2002 c.2  Available
8
Book
Book Cover

Hacking exposed : network security secrets & solutions


Scambray, Joel
Berkeley, Calif. : Osborne/McGraw-Hill, 2001. 2001

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 M48 2001    Available
9
Book
Book Cover

Copies

10
Book
Book Cover

Building Internet firewalls


Zwicky, Elizabeth D
Beijing ; Cambridge [Mass.] : O'Reilly, c2000. 2000

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 .Z85 2000    Available
11
Book
Book Cover

The process of network security : designing and managing a safe network


Wadlow, Thomas A
Reading, Mass. : Addison Wesley, 2000 2000

Rating:

 

Copies

12
Book
Book Cover

Intranet security : stories from the trenches


McCarthy, Linda
Mountainview, Calif. : Sun Microsystems Press, 1998. 1998

Rating:

 

Copies

13
Book
Book Cover

Building secure and reliable network applications


Birman, kenneth P
Greenwish : Manning , 1996. 1996

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 B57 1996    Available
Add Marked to Bag Add All On Page Add Marked to My Lists
Resources
More Information