|
1.
|
Sockets, shellcode, porting, and coding : reverse engineering exploits and tool coding for security professionals.
by Price, Mike | Foster, James C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: U.S.A.: Syngress Publishing, 2005Availability: Items available for loan: [Call number: 005.8 FOS] (1).
|
|
2.
|
IT security project management : handbook
by Snedaker, Susan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Syngress, 2006Availability: Items available for loan: [Call number: 005.8 SNE] (1).
|
|
3.
|
Configuring ISA server 2000 : building firewalls for windows 2000
by Shinder, Thomas W | Grasdal, Martin | Shinder, Debra Littlejohn. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress Publishing, 2001Availability: Items available for loan: [Call number: 005.71 SHI] (2).
|
|
4.
|
Hack proofing Linux : a guide to open source security
by Stanger, James | Lane, Patrick T. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: U.S.A.: Syngress Publishing, 2001Availability: Items available for loan: [Call number: 005.8 STA] (2).
|
|
5.
|
Hack Proofing Your Wireless Network
by Barnes, Christian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress Publishing, 2002Availability: Items available for loan: [Call number: 621.319 BAR] (1).
|
|
6.
|
Cisco security professional's guide to secure intrusion detection systems
by Burton, James | Baumrucker, C. Tate | Dubrawsky, Ido | Osipov, Vitaly. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2003Availability: Items available for loan: [Call number: 005.8 BUR] (1).
|
|
7.
|
Cyber crime and cyber terrorism investigator's handbook
by Akhgar, Babak | Bosco, Francesca | Staniforth, Andrew. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham: Syngress, 2014Availability: Items available for loan: [Call number: 364.168 AKH] (1).
|
|
8.
|
How to own a shadow : the chase for Knuth
by Long, Johnny | Mullen, Timothy M | Russell, Ryan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 813.6 LON] (1).
|
|
9.
|
Virtualization with Microsoft Virtual Server 2005
by Dittner, Rogier. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress Publishing, 2006Availability: Items available for loan: [Call number: 005.4476 DIT] (1).
|
|
10.
|
XSS attacks : cross site scripting exploits and defense
by Grossman, Jeremiah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2007Availability: Items available for loan: [Call number: 005.6 GRO] (1).
|
|
11.
|
Practical Oracle security : your unauthorized guide to relational database security
by Shaul, Josh | Ingram, Aaron. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 005.8 SHA] (1).
|
|
12.
|
Web application vunerabilities : detect, exploit, prevent
by Cross, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress Publishing, 2007Availability: Items available for loan: [Call number: 005.8 CRO] (2).
|
|
13.
|
Best damn firewall book period
by Shinder, Thomas W. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 005.8 SHI] (1).
|
|
14.
|
Best damn Exchange, SQL and IIS book period
by Walther, Henrik | Adams, Chris | Horninger, Mark. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 005.71376 WAL] (1).
|
|
15.
|
Next generation SSH2 implementation : securing data in motion
by Liu, Dale. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress Publishing, 2009Availability: Items available for loan: [Call number: 005.8 LIU] (1).
|
|
16.
|
Professional penetration testing : creating and operating a formal hacking lab
by Wilhelm, Thomas | Kanclirz, Jan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2010Availability: Items available for loan: [Call number: 005.8068 WIL] (2).
|
|
17.
|
Network and system security
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2010Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
18.
|
Securing the cloud : cloud computer security techniques and tactics
by Winkler, Vic. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 WIN] (1).
|
|
19.
|
Web application obfuscation
by Heiderich, Mario. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 HEI] (1).
|
|
20.
|
Cyber warfare : techniques, tactics and tools for security practitioners
by Andress, Jason | Winterfeld, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 355.343 AND] (1).
|