Results
|
1.
|
|
|
|
2.
|
|
|
|
3.
|
|
|
|
4.
|
|
|
|
5.
|
|
|
|
6.
|
|
Best damn firewall book period / T.W. Shinder ... [et al.]. by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Burlington, Mass. : Oxford : Syngress ; Elsevier Science [distributor], c2003
Availability: Items available for loan: Judith Thomas Library (1)Call number: TK 5105.59 .B466 2003.
|
|
7.
|
|
Writing secure code / Michael Howard and David LeBlanc. by
Edition: 2nd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Redmond, Wash. : Microsoft Press, c2003
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 H698 2003.
|
|
8.
|
|
|
|
9.
|
|
|
|
10.
|
|
Linux firewalls / Robert L. Ziegler, Carl B. Constantine. by
Edition: 2nd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Indianapolis, IN : New Riders, 2002
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 Z54 2002.
|
|
11.
|
|
|
|
12.
|
|
|
|
13.
|
|
|
|
14.
|
|
|
|
15.
|
|
Honeypots : tracking hackers / Lance Spitzner. by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston : Addison-Wesley, c2003
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 S67 2003.
|
|
16.
|
|
|
|
17.
|
|
Network security : a hacker's perspective / Ankit Fadia. by
Edition: 2nd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston, MA : Thompson Course Technology, c2006
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 F32 2006.
|
|
18.
|
|
|
|
19.
|
|
|
|
20.
|
|
|