Your search returned 6 results.

Sort
Results
Windows Server 2003 security bible

by Rampling, Blair.

Material type: Text Text Publication details: Indianapolis, Ind : Wiley, c2003Online access: Click here to access online | Click here to access online | Click here to access online Availability: Items available for loan: 2 Call number: 004.69 RAM, ...

Red Hat Linux security and optimization

by Kabir, Mohammed J.

Material type: Text Text Publication details: New Delhi : Wiley Dreamtech India (P) Ltd., ©2002Availability: Items available for loan: 1 Call number: 005.43 KAB.

Network security bible

by Cole, Eric | Krutz, Ronald L | Conley, James W.

Material type: Text Text Publication details: Indianapolis, IN : Wiley Pub., c2005Online access: Click here to access online | Click here to access online | Click here to access online Availability: Items available for loan: 1 Call number: 005.82 COL.

Applied cryptography : protocols, algorithms, and source code in C

by Schneier, Bruce.

Edition: 2nd Edition.Material type: Text Text Publication details: New Delhi : John Wiley & Sons, Inc., 2002Availability: Items available for loan: 1 Call number: 005.82 SCH.

Professional Windows desktop and server hardening

by Grimes, Roger A.

Material type: Text Text Publication details: Indianapolis, IN : Wiley, c2006Online access: Click here to access online | Click here to access online | Click here to access online Availability: Items available for loan: 2 Call number: 005.82 GRI, ...

Penetration testing essentials /

by Oriyano, Sean Philip.

Edition: 1st edition.Material type: Text Text Publication details: Indianapolis, Indiana : Sybex, a Wiley brand, [2017]Availability: Items available for loan: 1 Call number: 005.8 ORI.

Pages

© University of Vavuniya

---