Refine your search

Your search returned 52 results.

Not what you expected? Check for suggestions
1.
Virtualization for security [electronic resource] : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting / John Hoopes, technical editor ; Aaron Bawcom ... [et al.].

by Hoopes, John.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Burlington, MA : Syngress Pub., c2009Online access: ScienceDirect Availability: No items available :

2.
Eleventh hour network+ [electronic resource] : exam N10-004 study guide / Naomi J. Alpern, Robert J. Shimonski.

by Alpern, Naomi J | Shimonski, Robert.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Rockland, Mass. : Oxford : Syngress ; Elsevier Science [distributor], 2010Online access: ScienceDirect Availability: No items available :

3.
Eleventh hour security+ [electronic resource] : exam SYO-201 study guide / by Ido Dubrawsky.

by Dubrawsky, Ido.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Rockland, Mass. : Oxford : Syngress ; Elsevier Science [distributor], 2009Online access: ScienceDirect Availability: No items available :

4.
Next generation SSH2 implementation [electronic resource] : securing data in motion / Dale Liu, lead author and technical editor ; Max Caceres ... [et al.].

by Liu, Dale.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Burlington, MA : Syngress Pub., c2009Online access: ScienceDirect Availability: No items available :

5.
Nokia firewall, VPN, and IPSO configuration guide [electronic resource] / Andrew Hay, Peter Giannoulis, Keli Hay.

by Hay, Andrew, 1973- | Giannoulis, Peter | Hay, Keli.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Burlington, MA : Syngress Pub., c2009Online access: ScienceDirect Availability: No items available :

6.
GFI network security and PCI compliance power tools [electronic resource] / Brien Posey ; Troy Thompson, technical editor ; foreword by Laura Taylor.

by Posey, Brien | Thompson, Troy.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Burlington, MA : Syngress Pub, c2009Online access: ScienceDirect Availability: No items available :

7.
Professional penetration testing [electronic resource] : creating and operating a formal hacking lab / by Thomas Wilhelm.

by Wilhelm, Thomas.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Rockland, Mass. : Oxford : Syngress ; Elsevier Science [distributor], c2010Online access: ScienceDirect Availability: No items available :

8.
Improving web application security: thereats and conutermeasures

by Meier, J D.

Material type: Text Text; Format: print Language: English Publisher: New delhi : Prentice hall, 2004Availability: Items available for reference: Not for loanCall number: 005.276 MEI/I (1). :

9.
Cryptography and network security: principles and practices

by Stallings, William.

Edition: 3Material type: Text Text; Format: print Language: English Publisher: Singapore : Pearson education, 2003Availability: Items available for reference: Not for loanCall number: 005.8 STA/C (1). :

10.
Rethinking public key infrastructures and digital certificates: building in privacy

by Brands, Stefan A.

Material type: Text Text; Format: print Language: English Publisher: Cambridge : Mit press, 2001Availability: Items available for loan: Call number: 005.8 BRA/R (1).

11.
Scene of cybercrime: computer forensics handbook

by Shinder Debra Littlejohn.

Material type: Text Text; Format: print Language: English Publisher: Rockland : Syngress publishing inc, 2002Availability: Items available for reference: Not for loanCall number: 364.168 SHI/S (1). :

12.
Computer and intrusion forensics

by Mohay, George... [Et. Al.].

Material type: Text Text; Format: print Language: English Publisher: Boston : Artech house, 2003Availability: Items available for reference: Not for loanCall number: 005.8 MOH/C (1). :

13.
Cisco securityspecialist's guide to pix firewall

by Baumrucker , Tate C.

Material type: Text Text; Format: print Language: English Publisher: Rockland : Syngress publishing inc., 2002Availability: Items available for loan: Call number: 005.8 BAU/C (1).

14.
Security sage's guide to hardening the network infrastructure

by Andres , Steven.

Material type: Text Text; Format: print Language: English Publisher: Rockland : Syngress publishing inc., 2004Availability: Items available for loan: Call number: 005.8 AND/S (1).

15.
Pki security solutions for the enterprise: solving hippa, e-paper act and other

by Raina, Kapil.

Material type: Text Text; Format: print Language: English Publisher: Indiana : Wiley publishing, 2003Availability: Items available for loan: Call number: 005.8 RAI/P (1).

16.
Hack attacks testing: how to conduct your own security audit

by Chirillo, John.

Material type: Text Text; Format: print Language: English Publisher: Indiana : Wiley, 2003Availability: Items available for loan: Call number: 005.8 CHI/H (1).

17.
Network security: private communication in a public world

by Kaufman, Charlie.

Edition: 2nd.Material type: Text Text; Format: print Language: English Publisher: New delhi : Pearson education, 2008Availability: Items available for loan: Call number: 005.8 KAU/N (1).

18.
Network security: a hacker's perspective

by Fadia, Ankit.

Edition: 2ndMaterial type: Text Text; Format: print Language: English Publisher: Delhi : Mcmillan, 2008Availability: Items available for loan: Call number: 005.8 FAD/N (1).

19.
How to cheat at securing your network

by Dubrawksy, Ido, Ed.

Material type: Text Text; Format: print Language: English Publisher: Burlington : Syngress, 2007Availability: Items available for loan: Call number: 005.8 DUB,H (1).

20.
Security+ guide to network security fundamentals

by Ciampa, Mark.

Edition: 3rd.Material type: Text Text; Format: print Language: English Publisher: Boston : Course technology, 2009Availability: Items available for loan: Call number: 005.8 CIA/S (1).

21.
Guide to strategic infrastructure security: becoming a security network professional

by Weaver, Randy.

Material type: Text Text; Format: print Language: English Publisher: Australia : Course technology, 2009Availability: Items available for loan: Call number: 005.8 WEA/G (1).

22.
Principles of incident response and disaster recovery

by Whitman, Michale E.

Material type: Text Text; Format: print Language: English Publisher: Australia : Course technology, 2007Availability: Items available for loan: Call number: 658.478 WHI/P (1).

23.
Guide to network defence and countermeasures

by Weaver, Randy.

Material type: Text Text; Format: print Language: English Publisher: Australia : Course technology, 2007Availability: Items available for loan: Call number: 005.8 WEA/G (1).

24.
Hands-on ethical hacking and network defence

by Simpsom, Michale T.

Material type: Text Text; Format: print Language: English Publisher: Australia : Course technology, 2006Availability: Items available for loan: Call number: 005.8 SIM/H (1).

25.
Guide to linux networking and security

by Wells, Nicholas.

Material type: Text Text; Format: print Language: English Publisher: Australia : Course technology, 2003Availability: Items available for loan: Call number: 005.432 WEL/G (1).


Implemented and Maintained by Biju Patnaik Central Library.
For any Suggestions/Query Contact to library or Email: library@nitrkl.ac.in OR bpcl-cir@nitrkl.ac.in. Ph:91+6612462103
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha