1. Network Management : concepts and practice, a hands-on approach

by Burke, J. Richard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 004.6068 BUR] (2).
2. Networking

by Beasley, Jeffrey S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Ohio: Prentice Hall, 2004Availability: Items available for loan: [Call number: 004.6 BEA] (2).
3. Know your enemy : learning about security threats

by Honeynet project.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 HON] (2).
4. Inside network security assessment : guarding your IT infrastructure

by Gregg, Michael | Kim, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2005Availability: Items available for loan: [Call number: 005.8 GRE] (2).
5. Sustainability and community technology : what does this mean for community informatics; community informatics research network 2004 colloquium and conference proceedings; 29 September - 1 October 2004, Monash Centre, Prato Italy. Volume 1

by Johanson, Graeme | Stillman, Larry | Community Informatics Research Network.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Melbourne: Centre for Community Networking Research, School of Information Management &? Systems, Monash University and Community Informatics Research Network, 2004Availability: Items available for loan: [Call number: 306.46 COM] (3).
6. Computer forensics : computer crime scene investigation

by Vacca, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Charles River Media, 2002Availability: Items available for loan: [Call number: 363.25968 VAC] (2).
7. Software vulnerability guide

by Thompson, Herbert H | Chase, Scott G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hingham: Charles River Media, 2005Availability: Items available for loan: [Call number: 005.8 THO] (2).
8. Introduction to network programming with Java

by Graba, Jan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2006Availability: Items available for loan: [Call number: 005.2762 GRA] (2).
9. Computer Networks and Internets : with internet applications

by Comer, Douglas E.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2004Availability: Items available for loan: [Call number: 004.6 COM] (4).
10. Guide to networking essentials

by Tomsho, Greg | Johnson, David | Tittel, Ed.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson Course Technology, 2007Availability: Items available for loan: [Call number: 004.6 TOM] (2).
11. Networking and internetworking with microcontrollers

by Eady, Fred.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Oxford: Newnes, 2004Availability: Items available for loan: [Call number: 629.89 EAD] (2).
12. Implementing Directory Services

by Reed, Archie.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2000Availability: Items available for loan: [Call number: 004.6 REE] (2).
13. Wi-Fi home networking

by Smith, Raymond J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2003Availability: Items available for loan: [Call number: 004.68 SMI] (2).
14. Network routing : algorithms, protocols, and architectures

by Medhi, Deepankar | Ramasamy, Karthikeyan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2007Availability: Items available for loan: [Call number: 004.6 MED] (2).
15. How to break Web software : functional and security testing of Web applications and Web services

by Andrews, Mike | Whittaker, James A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.14 AND] (2).
16. CAN system engineering : from theory to practical applications

by Lawrenz, Wolfhard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 1997Availability: Items available for loan: [Call number: 670.4275 LAW] (2).
17. Hiding in plain sight : steganography and the art of covert communication

by Cole, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
18. Computer Networking : Internet protocols in action

by Matthews, Jeanna.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 004.62 MAT] (2).
19. Web security for network and system administrators

by Mackey, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Course Technology, 2003Availability: Items available for loan: [Call number: 005.8 MAC] (4).
20. Lab manual for Security+ guide to network security fundamentals

by Cretaro, Paul.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Thomson Course Technology, 2005Availability: Items available for loan: [Call number: 005.8 CRE] (2).

Powered by Koha