Log in
Koha online
Library
Title
Author
Subject
ISBN
Series
Call number
Go
Advanced search
Course reserves
Authority search
Tag cloud
Search history
[
x
]
×
Log in to your account
Login:
Password:
Forgot your password?
Refine your search
Availability
Limit to currently available items.
Authors
Bejtlich, Richard
Honig, Andrew
Sikorski, Michael
Item types
Books
Topics
Computer security
Enterprise network i...
Layer 3 network acce...
Malware - Computer s...
Malware Behavior
Show more
Your query retrived 2 records.
|
Unhighlight
Highlight
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
1.
Extrusion detection : security monitoring for internal intrusions
by
Bejtlich, Richard.
Material type:
Book
; Format:
print
; Literary form:
Not fiction
Publisher:
Upper Saddle River: Addison-Wesley, 2006
Availability:
Items available for loan:
[
Call number:
005.8 BEJ] (1).
Place hold
2.
Practical malware analysis : the hands-on guide to dissecting malicious software
by
Sikorski, Michael
|
Honig, Andrew
|
Bejtlich, Richard.
Material type:
Book
; Format:
print
; Literary form:
Not fiction
Publisher:
San Francisco: No Starch Press, 2012
Availability:
Items available for loan:
[
Call number:
005.84 SIK] (1).
Place hold
Powered by
Koha