Refine your search

Your search returned 272 results.

Not what you expected? Check for suggestions
Safe and secure : secure your home network, and protect your privacy online / Arman Danesh, Felix Lau, and Ali Mehrassa.

by Danesh, Arman | Lau, Felix | Mehrassa, Ali.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, Ind. : Sams, c2002Availability: Items available for loan: Institute of Environmental Science and Engineering (IESE)Call number: 005.8 (1).
IP Sec: the new security standard for the Internet, intranets, and virtual private networks the new security standard for the Internet, intranets, and virtual private networks Naganand Doraswamy, Dan Harkins.

by Doraswamy, Naganand | Harkins, Dan.

Publisher: Upper Saddle River, NJ : Prentice Hall, 1999Availability: Items available for loan: Central Library (CL)Call number: 005.8 DOR (1).
Network security essentials : applications and standards William Stallings.

by Stallings, William.

Publisher: Upper Saddle River, NJ : Prentice Hall, c2000Availability: Items available for loan: Central Library (CL)Call number: 005.8 STA (3).
Cryptography and network security: principles and practice principles and practice William Stallings.

by Stallings, William | Stallings, William.

Edition: 3rd ed. Publisher: Upper Saddle River, N.J. : Prentice Hall, c2003Availability: Items available for loan: Central Library (CL)Call number: 005.8 STA (6).
Cryptography and network security : principles and practice principles and practice William Stallings.

by Stallings, William | Stallings, William.

Edition: 2nd ed. Publisher: Upper Saddle River, N.J. : Prentice Hall, c1999Availability: Items available for loan: Central Library (CL)Call number: 005.8 STA (1).
Top secret intranet : how U.S. intelligence built Intelink the world's largest most secure network Fredrick Thomas Martin.

by Martin, Fredrick Thomas.

Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c1999Availability: Items available for loan: Central Library (CL)Call number: 025.04 MAR (1).
Network security: private communication in a public world Kaufman, Charlie

Edition: 2nd ed. Publisher: New Delhi : Pearson Education Inc, c2003Availability: Items available for loan: Central Library (CL)Call number: 005.820 KAU (7).
CCIE security exam certification guide Henry Benjamin

by Benjamin, Henry.

Edition: 2nd ed. Publisher: Indianapolis, IN : Cisco Press, c2005Online access: Table of contents Availability: Items available for loan: Central Library (CL)Call number: 004.6 BEN (1).
Cisco router firewall security Richard A. Deal

by Deal, Richard A.

Publisher: Indianapolis, Ind. : Cisco Press, c2005Availability: Items available for loan: Central Library (CL)Call number: 004.6 DEA (1).
Scalable and secure Internet services and architecture Cheng-Zhong Xu.

by Xu, Chengzhong.

Publisher: Boca Raton, FL ; London : Chapman & Hall/CRC, 2005Availability: Items available for loan: Central Library (CL)Call number: 004.678 XUC (1).
Selinux: NSA's open source security enhanced Linux NSA's open source security enhanced Linux Bill McCarty

by McCarty, Bill.

Edition: 1st ed. Publisher: Beijing ; Sebastopol, CA : O'Reilly, c2005Other title: NSA's open source security enhanced Linux.Online access: Publisher description | Contributor biographical information Availability: Items available for loan: Central Library (CL)Call number: 005.432 MCC (1).
Security for mobile networks and platforms Selim Aissi, Nora Dabbous, Anand R. Prasad

by Aissi, Selim | Dabbous, Nora | Prasad, Anand.

Publisher: Norwood, MA : Artech House, c2006Availability: Items available for loan: Central Library (CL)Call number: 005.8 AIS (2).
Hardening Cisco routers Thomas Akin.

by Akin, Thomas.

Publisher: Beijing ; Sebastopol : O'Reilly, c2002Online access: Publisher description | Contributor biographical information Availability: Items available for loan: Central Library (CL)Call number: 005.8 AKI (1).
The CERT guide to system and network security practices Julia H. Allen.

by Allen, Julia H.

Publisher: Boston, MA ; Singapore : Addison-Wesley, c2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 ALL (1).
Maximum security Anonymous.

Edition: 3rd ed. Publisher: Indianapolis, Ind. : Sams Pub., c2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 ANO (2). Checked out (1).
Cisco ASA and PIX firewall handbook David Hucaby.

by Hucaby, David.

Publisher: Indianapolis, IN : Cisco Press, c2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 HUC (1).
Cisco network security troubleshooting handbook Mynul Hoda

by Hoda, Mynul.

Publisher: Indianapolis, Ind. : Cisco Press, c2006Availability: Items available for loan: Central Library (CL)Call number: 005.8 HOD (1).
Protecting your Web site with firewalls Marcus Goncalves.

by Goncalves, Marcus.

Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c1997Availability: Items available for loan: Central Library (CL)Call number: 005.8 GON (1).
Presenting digital cash Seth Godin.

by Godin, Seth.

Edition: 1st ed. Publisher: Indianapolis, Ind. : Sams Net Pub., c1995Other title: Digital cash.Availability: Items available for loan: Central Library (CL)Call number: 005.8 GOD (1).
Kerberos: the definitive guide the definitive guide Jason Garman

by Garman, Jason.

Edition: 1st ed. Publisher: Beijing ; Farnham : O'Reilly, 2003Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 GAR (1).
Principles of secure network systems design Sumit Ghosh ; with a foreword by Harold Lawson.

by Ghosh, Sumit.

Publisher: New York : Springer, c2002Online access: Table of contents | Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 GHO (1).
Secrets and lies : digital security in a networked world Bruce Schneier.

by Schneier, Bruce.

Publisher: New York : Wiley Pub., c2000Availability: Items available for loan: Central Library (CL)Call number: 005.8 SCH (5).
Java 2 network security Marco Pistoia ... [et al.].

by Pistoia, Marco.

Edition: 2nd ed. Publisher: Upper Saddle River, N.J. : Prentice Hall, c1999Availability: Items available for loan: Central Library (CL)Call number: 005.8.PIS (2).
Information security risk analysis Thomas R. Peltier.

by Peltier, Thomas R.

Edition: 2nd ed. Publisher: Boca Raton : Auerbach Publications, 2005Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 PEL (1).
Internet and Intranet security Rolf Oppliger.

by Oppliger, Rolf.

Edition: 2nd ed. Publisher: Boston, MA : Artech House, 2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 OPP (1).
Firewall architecture for the enterprise Norbert Pohlmann and Tim Crothers.

by Pohlmann, Norbert | Crothers, Tim.

Publisher: New York, NY : Wiley Pub., c2002Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.8 POH (1).
Enterprise security Robert C. Newman

by Newman, Robert C.

Publisher: New Delhi : Pearson Education Inc., c2003Availability: Items available for loan: Central Library (CL)Call number: 005.8 NEW (2).
Defense and detection strategies against Internet worms Jose Nazario.

by Nazario, Jose.

Publisher: Boston, MA : Artech House, 2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 NAZ (1).
Mastering network security Chris Brenton, Cameron Hunt.

by Brenton, Chris | Hunt, Cameron.

Edition: 2nd ed. Publisher: San Francisco : Sybex, c2003Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 BRE (5).
Network security assessment Chris McNab

by McNab, Chris.

Edition: 1st edition. Publisher: Sebastopol, CA ; O'Reilly Media, c2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 MCN (1).
Internet security protocols : protecting IP traffic Uyless Black.

by Black, Uyless D.

Publisher: India : Pearson Education Asia, c2000Availability: Items available for loan: Central Library (CL)Call number: 005.8 BLA (2).
Designing network security Merike Kaeo.

by Kaeo, Merike.

Edition: 2nd ed. Publisher: Indianapolis, IN : Cisco Press, c2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 KAE (2).
Network security technologies Kwok T. Fung.

by Fung, K. T.

Edition: 2nd ed. Publisher: Boca Raton, FL : Auerbach Publications, c2005Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 FUN (2).
Secure computers and networks : analysis, design, and implementation Eric A. Fisch, Gregory B. White

by Fisch, Eric A | White, Gregory B.

Publisher: Boca Raton, FL : CRC Press, 2000Availability: Items available for loan: Central Library (CL)Call number: 005.8 FIS (1).
The complete Cisco VPN configuration guide Richard Deal

by Deal, Richard A | Cisco Systems, Inc.

Publisher: Indianapolis, Ind. : Cisco Press, c2006Online access: Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 DEA (1).
Securing Windows Server 2003 Mike Danseglio

by Danseglio, Mike.

Publisher: Sebastopol, Calif. : O'Reilly, c2005Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 DAN (1).
Data communications and network security Houston H. Carr, Charles A. Snyder

by Carr, Houston H | Snyder, Charles A.

Publisher: India : Tata McGraw-Hill Irwin, c2007Other title: Data communications & network security.Online access: Publisher description | Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.8 CAR (1).
Fundamentals of network security John E. Canavan.

by Canavan, John E.

Publisher: Boston : Artech House, c2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 CAN (1).
Intrusion prevention fundamentals Earl Carter, Jonathan Hogue

by Carter, Earl | Hogue, Jonathan.

Publisher: Indianapolis, IN : Cisco Press, c2006Other title: Introduction to network attack mitigation with IPS.Availability: Items available for loan: Central Library (CL)Call number: 005.8 CAR (1).
Network security bible Eric Cole, Ronald Krutz, and James W. Conley.

by Cole, Eric | Krutz, Ronald L, 1938- | Conley, James W.

Publisher: Indianapolis, IN : Wiley Pub., c2005Online access: Table of contents only | Contributor biographical information | Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 COL (1).
Error correcting coding and security for data networks: analysis of the superchannel concept analysis of the superchannel concept G. Kabatiansky, E. Krouk, S. Semenov.

by Kabatiansky, G | Krouk, E | Semenov, S | Wiley InterScience (Online service).

Publisher: London : John Wiley & Sons, c2005Other title: Error correcting coding and security for data networks [electronic resource].Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005.8 KAB (1).
Network security: a practical approach a practical approach Jan L. Harrington.

by Harrington, Jan L.

Publisher: Amsterdam ; Boston : Elsevier : Morgan Kaufmann Publishers, c2005Online access: Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 (1).
Security in wireless LANs and MANs Thomas Hardjono, Lakshminath R. Dondeti.

by Hardjono, Thomas | Dondeti, Lakshminath R.

Publisher: Boston : Artech House, 2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 HAR (1).
ASP MTS ADSI Web security Harrison.

by Harrison, Richard.

Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c1999Availability: Items available for loan: Central Library (CL)Call number: 005.8 HAR (1).
Secure group communications over data networks Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras.

by Zou, Xukai | Ramamurthy, Byrav | Magliveras, Spyros S, 1938-.

Publisher: New York : Springer c2005Online access: Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 ZOU (1).
Voice and data security Gregory White ... [et al.].

by White, Gregory B.

Publisher: Indianapolis, Ind. : SAMS, 2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 WHI (1).
Principles of information security Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E | Mattord, Herbert J.

Edition: 2nd ed. Publisher: Boston, Mass. : Thomson Course Technology, c2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 WHI (1).
Network security with OpenSSL John Viega, Matt Messier and Pravir Chandra.

by Viega, John | Messier, Matt | Chandra, Pravir.

Edition: 1st ed. Publisher: Sebastopol, CA : O'Reilly, c2002Other title: Network security with Open secure socket layer.Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 VIE (1).
Enhancing computer security with smart technology V. Rao Vemuri.

by Vemuri, V. Rao.

Publisher: Boca Raton, FL : Auerbach Publications, 2006Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 VEM (1).
Computer forensics : computer crime scene investigation John R. Vacca.

by Vacca, John R.

Edition: 2nd ed. Publisher: Hingham, Mass. : Charles River Media, 2005Online access: Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.8 VAC (1).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.