Skip to contents

  1. Burns, Bryan [Other]

    Security power tools - [1. ed.]

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Beijing; Köln [u.a.]: O'Reilly, 2007

  2. Vacca, John R. [Editor]

    Network and system security

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Amsterdam; Boston; Heidelberg [u.a.]: Syngress, 2010

  3. Krishnamurthy, Mohan [Other]

    How to cheat at securing Linux : [the perfect reference for the multitasked SysAdmin ; dicover why "measure twice, cut once" applies to securing Linux ; complete coverage of hardening the operating system, implementing an intrusion detection system, and scanning your network ; time-saving tips on network analysis and troubleshooting]

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Burlington, Mass.: Syngress, 2008

  4. Carey, Mark [Author]; Criscuolo, Paul [Author] ; Rogers, Russ [Editor]; Petruzzi, Mike [Other]

    Nessus network auditing : [Master the De Facto standard for network vulnerability scanning! ; your complete guide to Nessus version 3.x and the enhanced NASL engine ; use Nessus to achieve regulatory compliance for: FERPA, HIPAA, NIST, CIS, Sarbanes-Oxley, and NERC ; improve the speed and accurarcy of your Nessus scans] - [2nd ed.]

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Burlington, Mass.: Syngress, 2008

  5. Purser, Michael [Author]

    Secure data networking

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Boston [u.a.]: Artech House, 1993

    Published in: The Artech House optoelectronics library

  6. Kizza, Joseph Migga [Author]

    Guide to computer network security - [2. ed.]

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    London, Heidelberg [u.a.]: Springer, 2013

    Published in: Computer communications and networks

  7. Huang, Scott C.-H [Editor]; MacCallum, David [Editor]; Du, Ding-Zhu [Editor]

    Network Security

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    New York; Heidelberg [u.a.]: Springer, 2010

  8. Oram, Andrew [Editor]; Oram, Andy [Other]; Viega, John [Other]

    Beautiful security

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Beijing; Köln [u.a.]: O'Reilly, 2009

    Published in: Theory in practice

  9. Kizza, Joseph Migga [Author]

    A guide to computer network security

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    London: Springer, 2009

    Published in: Computer communications and networks