Your search returned 21 results.

Sort
Results
Building Internet firewalls

by Chapman, D. Brent | Zwicky, Elizabeth D.

Material type: Text Text Publication details: Sebastopol, CA : O'Reilly & Associates, ©1995Availability: Items available for loan: 1 Call number: 004.6 CHA.

Designing network security

by Kaeo, Merike.

Edition: 2nd Edition.Material type: Text Text Publication details: Delhi : Pearson Education., 2004Availability: Items available for loan: 1 Call number: 004.6 KAE.

CCSP Cisco Secure PIX firewall advanced exam certification guide : CCSP self-study

by Bastien, Greg | Degu, Christian Abera.

Material type: Text Text Publication details: Delhi : Pearson Education., 2003Availability: Items available for loan: 1 Call number: 004.69 BAS.

Firewalls : a complete guide

by Goncalves, Marcus.

Material type: Text Text Publication details: New Delhi : Tata McGraw-Hill., 2000Availability: Items available for loan: 1 Call number: 004.69 GON.

Windows Server 2003 security bible

by Rampling, Blair.

Material type: Text Text Publication details: Indianapolis, Ind : Wiley, c2003Online access: Click here to access online | Click here to access online | Click here to access online Availability: Items available for loan: 2 Call number: 004.69 RAM, ...

Linux security

by Hontanol, Ramon J.

Material type: Text Text Publication details: New Delhi : BPB Publications, ©2001Availability: Items available for loan: 1 Call number: 005.43 HON.

Red Hat Linux security and optimization

by Kabir, Mohammed J.

Material type: Text Text Publication details: New Delhi : Wiley Dreamtech India (P) Ltd., ©2002Availability: Items available for loan: 1 Call number: 005.43 KAB.

Computer security : art and science

by Bishop, Matt.

Material type: Text Text Publication details: Delhi : Pearson Education., 2003Availability: Items available for loan: 1 Call number: 005.8 BIS.

Security complete

Edition: 2nd Edition.Material type: Text Text Publication details: New Delhi : BPB Publication., 2003Availability: Items available for loan: 1 Call number: 005.8 SEC.

Security operations for Microsoft Exchange 2000 server : patterns & practices

Material type: Text Text Publication details: New Delhi : Prentice Hall., 2002Availability: Items available for loan: 1 Call number: 005.8 SEC.

Network security bible

by Cole, Eric | Krutz, Ronald L | Conley, James W.

Material type: Text Text Publication details: Indianapolis, IN : Wiley Pub., c2005Online access: Click here to access online | Click here to access online | Click here to access online Availability: Items available for loan: 1 Call number: 005.82 COL.

Applied cryptography : protocols, algorithms, and source code in C

by Schneier, Bruce.

Edition: 2nd Edition.Material type: Text Text Publication details: New Delhi : John Wiley & Sons, Inc., 2002Availability: Items available for loan: 1 Call number: 005.82 SCH.

Computer security basics

by Russell, Deborah | Gangemi, G. T.

Material type: Text Text Publication details: Sebastopol, CA : O'Reilly & Associates, c1991Online access: Click here to access online | Click here to access online Availability: Items available for loan: 1 Call number: 005.8 RUS.

Cryptography and network security : principles and practice

by Stallings, William.

Edition: 3rd ed.Material type: Text Text Publication details: New Delhi : Prentice Hall, Pearson Education, 2003Availability: Items available for loan: 3 Call number: 005.82 STA, ...

Professional Windows desktop and server hardening

by Grimes, Roger A.

Material type: Text Text Publication details: Indianapolis, IN : Wiley, c2006Online access: Click here to access online | Click here to access online | Click here to access online Availability: Items available for loan: 2 Call number: 005.82 GRI, ...

IT auditing : using controls to protect information assets

by Davis, Chris | Schiller, Mike | Wheeler, Kevin.

Material type: Text Text Publication details: New Delhi : Tata McGraw-Hill c2007Online access: Click here to access online | Click here to access online | Click here to access online Availability: Items available for loan: 1 Call number: 657.450285 | DAV.

Cryptography and network security : Principles and Practice

by Stallings, William.

Edition: 5th ed.Material type: Text Text Publication details: New Delhi : Pearson, c2011Availability: Items available for loan: 1 Call number: 005.82 STA.

Guide to computer forensics and investigations : Processing Digital Evidence

by Nelson, Bill | Phillips, Amelia | Steuart, Christopher.

Edition: 5th edition.Material type: Text Text Publication details: Boston, MA : Cengage Learning, [2016] ©2016Availability: Items available for loan: 1 Call number: 005.8 NEL.

Penetration testing essentials /

by Oriyano, Sean Philip.

Edition: 1st edition.Material type: Text Text Publication details: Indianapolis, Indiana : Sybex, a Wiley brand, [2017]Availability: Items available for loan: 1 Call number: 005.8 ORI.

Security in computing /

by Pfleeger, Charles P | Pfleeger, Shari Lawrence | Margulies, Jonathan.

Edition: Fifth edition.Material type: Text Text Publication details: [Upper Saddle River, NJ : ?] [Prentice Hall], [2015]Availability: Items available for loan: 2 Call number: 005.8 PFL, ...

Pages

© University of Vavuniya

---