1. Sockets, shellcode, porting, and coding : reverse engineering exploits and tool coding for security professionals.

by Price, Mike | Foster, James C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A.: Syngress Publishing, 2005Availability: Items available for loan: [Call number: 005.8 FOS] (1).
2. IT security project management : handbook

by Snedaker, Susan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Syngress, 2006Availability: Items available for loan: [Call number: 005.8 SNE] (1).
3. Configuring ISA server 2000 : building firewalls for windows 2000

by Shinder, Thomas W | Grasdal, Martin | Shinder, Debra Littlejohn.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress Publishing, 2001Availability: Items available for loan: [Call number: 005.71 SHI] (2).
4. Hack proofing Linux : a guide to open source security

by Stanger, James | Lane, Patrick T.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A.: Syngress Publishing, 2001Availability: Items available for loan: [Call number: 005.8 STA] (2).
5. Hack Proofing Your Wireless Network

by Barnes, Christian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress Publishing, 2002Availability: Items available for loan: [Call number: 621.319 BAR] (1).
6. Cisco security professional's guide to secure intrusion detection systems

by Burton, James | Baumrucker, C. Tate | Dubrawsky, Ido | Osipov, Vitaly.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress, 2003Availability: Items available for loan: [Call number: 005.8 BUR] (1).
7. Cyber crime and cyber terrorism investigator's handbook

by Akhgar, Babak | Bosco, Francesca | Staniforth, Andrew.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Waltham: Syngress, 2014Availability: Items available for loan: [Call number: 364.168 AKH] (1).
8. How to own a shadow : the chase for Knuth

by Long, Johnny | Mullen, Timothy M | Russell, Ryan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 813.6 LON] (1).
9. Virtualization with Microsoft Virtual Server 2005

by Dittner, Rogier.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress Publishing, 2006Availability: Items available for loan: [Call number: 005.4476 DIT] (1).
10. XSS attacks : cross site scripting exploits and defense

by Grossman, Jeremiah.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress, 2007Availability: Items available for loan: [Call number: 005.6 GRO] (1).
11. Practical Oracle security : your unauthorized guide to relational database security

by Shaul, Josh | Ingram, Aaron.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 005.8 SHA] (1).
12. Web application vunerabilities : detect, exploit, prevent

by Cross, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress Publishing, 2007Availability: Items available for loan: [Call number: 005.8 CRO] (2).
13. Best damn firewall book period

by Shinder, Thomas W.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 005.8 SHI] (1).
14. Best damn Exchange, SQL and IIS book period

by Walther, Henrik | Adams, Chris | Horninger, Mark.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 005.71376 WAL] (1).
15. Next generation SSH2 implementation : securing data in motion

by Liu, Dale.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress Publishing, 2009Availability: Items available for loan: [Call number: 005.8 LIU] (1).
16. Professional penetration testing : creating and operating a formal hacking lab

by Wilhelm, Thomas | Kanclirz, Jan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress, 2010Availability: Items available for loan: [Call number: 005.8068 WIL] (2).
17. Network and system security

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress, 2010Availability: Items available for loan: [Call number: 005.8 VAC] (1).
18. Securing the cloud : cloud computer security techniques and tactics

by Winkler, Vic.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 WIN] (1).
19. Web application obfuscation

by Heiderich, Mario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 HEI] (1).
20. Cyber warfare : techniques, tactics and tools for security practitioners

by Andress, Jason | Winterfeld, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 355.343 AND] (1).

Powered by Koha