Skip to contents Reese, Rachelle [Author] ; Cole, Eric [Other] Network security fundamentals project manual Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Hoboken, NJ: Wiley, 2007 Published in: Wiley pathways Stallings, William [Author]; Brown, Lawrie [Author] Computer security : principles and practice - [Fourth Edition, global edition] Books Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. New York, NY: Pearson, [2018] Burns, Bryan [Other] Security power tools - [1. ed.] Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Beijing; Köln [u.a.]: O'Reilly, 2007 Vacca, John R. [Editor] Network and system security Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Amsterdam; Boston; Heidelberg [u.a.]: Syngress, 2010 Acquisti, Alessandro [Editor] Digital privacy : theory, technologies, and practices Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. New York [u.a.]: Auerbach Publ., 2008 Krishnamurthy, Mohan [Other] How to cheat at securing Linux : [the perfect reference for the multitasked SysAdmin ; dicover why "measure twice, cut once" applies to securing Linux ; complete coverage of hardening the operating system, implementing an intrusion detection system, and scanning your network ; time-saving tips on network analysis and troubleshooting] Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Burlington, Mass.: Syngress, 2008 Shin, Bongsik [Author] A practical introduction to enterprise network and security management Books View online Schließen > Access ... to E-book Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Boca Raton; London; New York: CRC Press, [2017] Orebaugh, Angela [Author]; Pinkard, Becky [Author] Nmap : in the enterprise your guide to network scanning ; [use Nmap for network inventory, Asset management, policy compliance, and security auditing! ; covers Nmap 4.5X and 2nd generation OS fingerprinting ; analyze real-world scans and examples ; automate tasks with the Nmap Scripting Engine (NSE)] Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Burlington, Mass.: Syngress Publ., 2008 Lyon, Gordon [Author] nmap network scanning - [1. ed.] Books Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Sunnyvale, CA: Insecure.Com LLC, 2008 Carey, Mark [Author]; Criscuolo, Paul [Author] ; Rogers, Russ [Editor]; Petruzzi, Mike [Other] Nessus network auditing : [Master the De Facto standard for network vulnerability scanning! ; your complete guide to Nessus version 3.x and the enhanced NASL engine ; use Nessus to achieve regulatory compliance for: FERPA, HIPAA, NIST, CIS, Sarbanes-Oxley, and NERC ; improve the speed and accurarcy of your Nessus scans] - [2nd ed.] Books Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Burlington, Mass.: Syngress, 2008 Purser, Michael [Author] Secure data networking Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Boston [u.a.]: Artech House, 1993 Published in: The Artech House optoelectronics library Makki, S. Kami [Editor] Mobile and wireless network security and privacy Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. New York, NY: Springer, 2007 Gonçalves, Marcus [Author] Firewalls complete : [complete covergare of all major firewall products; coverage of all major encryption technologies; step-by-step firewall implementation; resourec lists including: firewall vendors, products, and a glossary of therms] Books Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. New York, NY [u.a.]: McGraw-Hill, 1998 Published in: Complete series Boni, William C. [Author]; Kovacich, Gerald [Author] Netspionage : the global threat to information Books Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Boston [u.a.]: Butterworth-Heinemann, 2000 Earle, Aaron E. [Author] Wireless security handbook Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Boca Raton, Fla. [u.a.]: Auerbach, 2006 ; London: Taylor & Francis, 2006 Schneier, Bruce [Author] Secrets and lies : digital security in a networked world; [with new information about post-9/11 security] Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. New York; Chichester: Wiley, 2004 Oppliger, Rolf [Author] SSL and TLS : theory and practice Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Boston, Mass. [u.a.]: Artech House, 2009 Published in: Artech House information security and privacy series Kizza, Joseph Migga [Author] Guide to computer network security - [2. ed.] Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. London, Heidelberg [u.a.]: Springer, 2013 Published in: Computer communications and networks Oram, Andrew [Editor]; Oram, Andy [Other]; Viega, John [Other] Beautiful security Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Beijing; Köln [u.a.]: O'Reilly, 2009 Published in: Theory in practice Kizza, Joseph Migga [Author] A guide to computer network security Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. London: Springer, 2009 Published in: Computer communications and networks
Reese, Rachelle [Author] ; Cole, Eric [Other] Network security fundamentals project manual Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Hoboken, NJ: Wiley, 2007 Published in: Wiley pathways
Stallings, William [Author]; Brown, Lawrie [Author] Computer security : principles and practice - [Fourth Edition, global edition] Books Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. New York, NY: Pearson, [2018]
Burns, Bryan [Other] Security power tools - [1. ed.] Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Beijing; Köln [u.a.]: O'Reilly, 2007
Vacca, John R. [Editor] Network and system security Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Amsterdam; Boston; Heidelberg [u.a.]: Syngress, 2010
Acquisti, Alessandro [Editor] Digital privacy : theory, technologies, and practices Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. New York [u.a.]: Auerbach Publ., 2008
Krishnamurthy, Mohan [Other] How to cheat at securing Linux : [the perfect reference for the multitasked SysAdmin ; dicover why "measure twice, cut once" applies to securing Linux ; complete coverage of hardening the operating system, implementing an intrusion detection system, and scanning your network ; time-saving tips on network analysis and troubleshooting] Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Burlington, Mass.: Syngress, 2008
Shin, Bongsik [Author] A practical introduction to enterprise network and security management Books View online Schließen > Access ... to E-book Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Boca Raton; London; New York: CRC Press, [2017]
Orebaugh, Angela [Author]; Pinkard, Becky [Author] Nmap : in the enterprise your guide to network scanning ; [use Nmap for network inventory, Asset management, policy compliance, and security auditing! ; covers Nmap 4.5X and 2nd generation OS fingerprinting ; analyze real-world scans and examples ; automate tasks with the Nmap Scripting Engine (NSE)] Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Burlington, Mass.: Syngress Publ., 2008
Lyon, Gordon [Author] nmap network scanning - [1. ed.] Books Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Sunnyvale, CA: Insecure.Com LLC, 2008
Carey, Mark [Author]; Criscuolo, Paul [Author] ; Rogers, Russ [Editor]; Petruzzi, Mike [Other] Nessus network auditing : [Master the De Facto standard for network vulnerability scanning! ; your complete guide to Nessus version 3.x and the enhanced NASL engine ; use Nessus to achieve regulatory compliance for: FERPA, HIPAA, NIST, CIS, Sarbanes-Oxley, and NERC ; improve the speed and accurarcy of your Nessus scans] - [2nd ed.] Books Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Burlington, Mass.: Syngress, 2008
Purser, Michael [Author] Secure data networking Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Boston [u.a.]: Artech House, 1993 Published in: The Artech House optoelectronics library
Makki, S. Kami [Editor] Mobile and wireless network security and privacy Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. New York, NY: Springer, 2007
Gonçalves, Marcus [Author] Firewalls complete : [complete covergare of all major firewall products; coverage of all major encryption technologies; step-by-step firewall implementation; resourec lists including: firewall vendors, products, and a glossary of therms] Books Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. New York, NY [u.a.]: McGraw-Hill, 1998 Published in: Complete series
Boni, William C. [Author]; Kovacich, Gerald [Author] Netspionage : the global threat to information Books Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Boston [u.a.]: Butterworth-Heinemann, 2000
Earle, Aaron E. [Author] Wireless security handbook Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Boca Raton, Fla. [u.a.]: Auerbach, 2006 ; London: Taylor & Francis, 2006
Schneier, Bruce [Author] Secrets and lies : digital security in a networked world; [with new information about post-9/11 security] Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. New York; Chichester: Wiley, 2004
Oppliger, Rolf [Author] SSL and TLS : theory and practice Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Boston, Mass. [u.a.]: Artech House, 2009 Published in: Artech House information security and privacy series
Kizza, Joseph Migga [Author] Guide to computer network security - [2. ed.] Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. London, Heidelberg [u.a.]: Springer, 2013 Published in: Computer communications and networks
Oram, Andrew [Editor]; Oram, Andy [Other]; Viega, John [Other] Beautiful security Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. Beijing; Köln [u.a.]: O'Reilly, 2009 Published in: Theory in practice
Kizza, Joseph Migga [Author] A guide to computer network security Books View online Schließen Close > Bookmarks You can manage bookmarks using lists, please log in to your user account for this. London: Springer, 2009 Published in: Computer communications and networks
> Media type Skip to next facet Books (1.798) Wert ausschließen Videos (99) Wert ausschließen Articles (41) Wert ausschließen Standards (28) Wert ausschließen Thesis (4) Wert ausschließen Electronic Resources (1) Wert ausschließen Kits (1) Wert ausschließen Show more show less
> Availability Skip to next facet Open Shelves (109) Wert ausschließen Stack Collection (222) Wert ausschließen Ask for availability (24) Wert ausschließen Show more show less
> Location Skip to next facet Departmental Library DrePunct (323) Wert ausschließen Central Library (22) Wert ausschließen TU Dresden holdings (14) Wert ausschließen Branch Library of Law (7) Wert ausschließen Branch Library of Medicine (2) Wert ausschließen Show more show less
> Rights information Skip to next facet In Copyright (28) Wert ausschließen Attribution - Non Commercial - No Derivs (CC BY-NC-ND) (2) Wert ausschließen Attribution (CC BY) (1) Wert ausschließen Show more show less
> Access State Skip to next facet Open Access (52) Wert ausschließen Restricted Access (80) Wert ausschließen Without Specification (1.499) Wert ausschließen Show more show less
> Language Skip to next facet English (1.832) Wert ausschließen German (94) Wert ausschließen Not determined (36) Wert ausschließen Chinese (8) Wert ausschließen French (7) Wert ausschließen Polish (4) Wert ausschließen Japanese (3) Wert ausschließen Spanish (2) Wert ausschließen Ndonga (1) Wert ausschließen Russian (1) Wert ausschließen Show more show less
> Subject Skip to next facet Computer science (1.106) Wert ausschließen Technology (389) Wert ausschließen Mathmatics (262) Wert ausschließen Economics (127) Wert ausschließen General (87) Wert ausschließen Jurisprudence (44) Wert ausschließen Sociology (36) Wert ausschließen Political science (13) Wert ausschließen Military science (9) Wert ausschließen Physics (6) Wert ausschließen General and comparative linguistics and literary studies, indo-european, non-european languages and literatures (4) Wert ausschließen Medicine (4) Wert ausschließen Philosophy (4) Wert ausschließen Psychology (4) Wert ausschließen Biology (2) Wert ausschließen Geology and paleontology (2) Wert ausschließen General sciences (1) Wert ausschließen American studies (1) Wert ausschließen Geography (1) Wert ausschließen Musicology (1) Wert ausschließen Pedagogy (1) Wert ausschließen Romance studies (1) Wert ausschließen Show more show less
> Creator Skip to next facet Institute of Electrical and Electronics Engineers (84) Wert ausschließen Safari Tech Books Online (64) Wert ausschließen Packt Publishing (43) Wert ausschließen Santos, Omar (30) Wert ausschließen IEEE Computer Society (28) Wert ausschließen ISO International Organization for Standardization (22) Wert ausschließen ISO Internationale Organisation für Normung (22) Wert ausschließen ISO Organisation Internationale de Normalisation (22) Wert ausschließen CEI Commission Electrotechnique Internationale (21) Wert ausschließen IEC International Electrotechnical Commission (21) Wert ausschließen IEC Internationale Elektrotechnische Kommission (21) Wert ausschließen Cisco Systems, Inc (18) Wert ausschließen Gregg, Michael (17) Wert ausschließen ISO/CEI JTC 1/SC 27 Techniques de sécurité des technologies de l'information (17) Wert ausschließen ISO/IEC JTC 1/SC 27 IT Security techniques (17) Wert ausschließen ISO/IEC JTC 1/SC 27 IT Sicherheitsverfahren (17) Wert ausschließen O'Reilly (Firm) (17) Wert ausschließen Harris, Shon (16) Wert ausschließen Jain, Prachi (16) Wert ausschließen ACI Learning (Firm) (15) Wert ausschließen IGI Global (15) Wert ausschließen Yung, Moti (15) Wert ausschließen Calder, Alan (14) Wert ausschließen Lowrie, Daniel (12) Wert ausschließen Zhou, Jianying (12) Wert ausschließen Diogenes, Yuri (11) Wert ausschließen Pearson (Firm) (11) Wert ausschließen Seidl, David (11) Wert ausschließen Bushmiller, Dean (10) Wert ausschließen Chapple, Mike (10) Wert ausschließen Messier, Ric (10) Wert ausschließen Greene, Sari Stern (9) Wert ausschließen Safari, an O’Reilly Media Company (9) Wert ausschließen Easttom, Chuck (8) Wert ausschließen Expanding Security (Firm) (8) Wert ausschließen Meng, Weizhi (8) Wert ausschließen Pedersen, Thor (8) Wert ausschließen Sequeira, Anthony (8) Wert ausschließen ACI Learning (7) Wert ausschließen Furnell, Steven (7) Wert ausschließen Gibson, Darril (7) Wert ausschließen Goodwin, Sophie (7) Wert ausschließen Hutchison, David (7) Wert ausschließen Kanade, Takeo (7) Wert ausschließen Kittler, Josef (7) Wert ausschließen Kleinberg, Jon (7) Wert ausschließen Lopez, Javier (7) Wert ausschließen Manning (Firm) (7) Wert ausschließen Mattern, Friedemann (7) Wert ausschließen Mitchell, John C. (7) Wert ausschließen Muniz, Joseph (7) Wert ausschließen Naor, Moni (7) Wert ausschließen Nierstrasz, Oscar (7) Wert ausschließen Pandu Rangan, C. (7) Wert ausschließen Stallings, William (7) Wert ausschließen Steffen, Bernhard (7) Wert ausschließen Sudan, Madhu (7) Wert ausschließen Terzopoulos, Demetri (7) Wert ausschließen Tygar, Doug (7) Wert ausschließen Vardi, Moshe Y. (7) Wert ausschließen Weikum, Gerhard (7) Wert ausschließen Andress, Jason (6) Wert ausschließen Barth, Doug (6) Wert ausschließen Beaver, Kevin (6) Wert ausschließen DIN Deutsches Institut für Normung e. V. (6) Wert ausschließen DIN German Institute for Standardization (6) Wert ausschließen Dingledine, Roger (6) Wert ausschließen Dulaney, Emmett A (6) Wert ausschließen Gilman, Evan (6) Wert ausschließen Gupta, Sunil (6) Wert ausschließen IEEE Communications Society (6) Wert ausschließen Lakhani, Aamir (6) Wert ausschließen McClure, Stuart (6) Wert ausschließen Miller, David (6) Wert ausschließen Oriyano, Sean-Philip (6) Wert ausschließen Vacca, John R. (6) Wert ausschließen Woland, Aaron T. (6) Wert ausschließen Bao, Feng (5) Wert ausschließen Bryan, Wes (5) Wert ausschließen Conklin, Wm. Arthur (5) Wert ausschließen Cross, Michael (5) Wert ausschließen Eckert, Claudia (5) Wert ausschließen Gordon, Adam (5) Wert ausschließen IEEE Computer Society Task Force on Information Assurance (5) Wert ausschließen Kammermann, Markus (5) Wert ausschließen Katsikas, Sokratis (5) Wert ausschließen Katsikas, Sōkratēs K. (5) Wert ausschließen Lioy, Antonio (5) Wert ausschließen Mason, Andrew (5) Wert ausschließen McNab, Chris (5) Wert ausschließen Oni, Alexander (5) Wert ausschließen Rong, Chunming (5) Wert ausschließen Vacca, John R (5) Wert ausschließen Velu, Vijay Kumar (5) Wert ausschließen Viega, John (5) Wert ausschließen Wayner, Peter (5) Wert ausschließen Winkler, Ira (5) Wert ausschließen Bella, Giampaolo (4) Wert ausschließen Berlin, Amanda (4) Wert ausschließen Camenisch, Jan (4) Wert ausschließen Show more show less
> Collection Skip to next facet Verbunddaten SWB (1.897) Wert ausschließen Lizenzfreie Online-Ressourcen (25) Wert ausschließen Nautos (ISO-Normen) (22) Wert ausschließen BASE - Bielefeld Academic Search Engine (8) Wert ausschließen IOP Publishing (CrossRef) (7) Wert ausschließen Nautos (DIN-Normen) (6) Wert ausschließen Fachkatalog Technikgeschichte (4) Wert ausschließen Institute of Electrical and Electronics Engineers (IEEE) (CrossRef) (4) Wert ausschließen Elsevier BV (CrossRef) (3) Wert ausschließen OPARU (OPen Access Repository of Ulm University) (3) Wert ausschließen Wiley (CrossRef) (3) Wert ausschließen theses.fr (3) Wert ausschließen Hindawi Limited (CrossRef) (2) Wert ausschließen IAES Indonesia Section (CrossRef) (2) Wert ausschließen Springer Science and Business Media LLC (CrossRef) (2) Wert ausschließen Abschlussarbeiten der TU Dresden (1) Wert ausschließen Bangladesh Journals Online (JOL) (CrossRef) (1) Wert ausschließen Diss online (1) Wert ausschließen Georg-August-Universität Göttingen: eDiss (1) Wert ausschließen IGI Global (CrossRef) (1) Wert ausschließen IOS Press (CrossRef) (1) Wert ausschließen Informa UK Limited (CrossRef) (1) Wert ausschließen International Journal for Research in Applied Science and Engineering Technology (IJRASET) (CrossRef) (1) Wert ausschließen Pleiades Publishing Ltd (CrossRef) (1) Wert ausschließen River Publishers (CrossRef) (1) Wert ausschließen SPIIRAS (CrossRef) (1) Wert ausschließen Scalable Computing: Practice and Experience (CrossRef) (1) Wert ausschließen Science Publications (CrossRef) (1) Wert ausschließen Science Publishing Corporation (CrossRef) (1) Wert ausschließen Springer Berlin Heidelberg (CrossRef) (1) Wert ausschließen Springer International Publishing (CrossRef) (1) Wert ausschließen The Science and Information Organization (CrossRef) (1) Wert ausschließen University of Baghdad College of Science (CrossRef) (1) Wert ausschließen Show more show less