My Library

   
Limit search to available items
Add Marked to Bag Add All On Page Add Marked to My Lists
Subjects (1-15 of 15)
Computer networks -- Securitry measures
1
Book
Book Cover

Building Internet firewalls


Zwicky, Elizabeth D
Beijing ; Cambridge [Mass.] : O'Reilly, c2000. 2000

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 .Z85 2000    Available
2
Book
Book Cover

Building secure and reliable network applications


Birman, kenneth P
Greenwish : Manning , 1996. 1996

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 B57 1996    Available
3
Book
Book Cover

Check point fire wall - 1 administration and CCSA study guide


Dangerfield, Steven
Upper Saddle River N.J. : Prentice Hall, 2002 2002

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9A25 D33 2002    Available
 Female Library  QA76.9A25 D33 2002 c.2  Available
4
Book
Book Cover

Counter hack : a step-by-step guide to computer attacks and effective defenses


Skoudis, Ed
Upper Saddle River, N.J. : Prentice Hall PTR, 2002 2002

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S57 2002    Available
 Male Library  TK5105.59 S57 2002    Available
5
Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William
Upper Saddle River, N.J. : Prentice Hall International, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S713 2003    Available
 Female Library  TK5105.59 S713 2003 c.2  Available
 Male Library  TK5105.59 S713 2003    Available
There are additional copies/volumes of this item
6
Book
Book Cover

Guide to network defense and countermeasures


Weaver, Randy
Boston : Thomson/Course technology, 2007 2007

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W33 2007    Available
7
Book
Book Cover

Hacking exposed : network security secrets & solutions


Scambray, Joel
Berkeley, Calif. : Osborne/McGraw-Hill, 2001. 2001

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 M48 2001    Available
8
Book
Book Cover

Information security illuminated


Solomon, Michael, 1963-
Sudbury, MA : Jones and Bartlett, 2005 2005

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 C435 2005 c.2  Available
9
Book
Book Cover

Intranet security : stories from the trenches


McCarthy, Linda
Mountainview, Calif. : Sun Microsystems Press, 1998. 1998

Rating:

 

Copies

10
Book
Book Cover

Copies

11
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Upper Saddle River, NJ. : Prentice Hall , 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S73 2003    Available
 Female Library  TK5105.59 S73 2003 c.2  Available
12
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Upper Saddle River, NJ. : Pearson International Education/Prentice Hall , 2007 2007

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S73 2007    Available
13
Book
Book Cover

Network security principles and practices


Malik, Saadat
Indianapolis, Ind. : Cisco, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 M34 2003    Available
14
Book
Book Cover

The process of network security : designing and managing a safe network


Wadlow, Thomas A
Reading, Mass. : Addison Wesley, 2000 2000

Rating:

 

Copies

15
Book
Book Cover

Copies

Location Call No. Status
 Female Library  TK5105.59 S33 2003    Available
 Female Library  TK5105.59 S33 2003 c.2  Available
Add Marked to Bag Add All On Page
Locate in results
Resources
More Information