Call Number (LC) | Title | Results |
---|---|---|
TK5105.59 .N48 2004eb | Network and security issues for internet mobile entertainment. | 1 |
TK5105.59 .N48 2010 |
Network security Network and system security / |
3 |
TK5105.59 .N48 2013 | Network robustness under large-scale attacks | 1 |
TK5105.59 .N48 2014 | Network and system security / | 1 |
TK5105.59 .N48 2014eb |
Networks and network analysis for defence and security / Network science and cybersecurity Network science and cybersecurity / |
3 |
TK5105.59 .N66 2006 | Firewall fundamentals / | 1 |
TK5105.59 .N67 1999 | Network intrusion detection : an analyst's handbook / | 1 |
TK5105.59 .N67 2001 | Network intrusion detection : an analyst's handbook / | 1 |
TK5105.59 .N676 2014eb | Integrated security systems design : a complete reference for building enterprise-wide digital security systems / | 2 |
TK5105.59 .O23 2007 | Security of e-systems and computer networks / | 1 |
TK5105.59 .O23 2007eb | Security of e-systems and computer networks / | 1 |
TK5105.59 .O34 2014eb | Official (ISC)2® guide to the ISSAP® CBK® / | 2 |
TK5105.59 .O3845 2016eb | The official (ISC)2® guide to the SSCP® CBK® / | 2 |
TK5105.59 .O48 2010 | Zabbix 1.8 network monitoring. | 1 |
TK5105.59.O48 2016 | Zabbix Network Monitoring - Second Edition. | 1 |
TK5105.59 .O54 2002eb | Web services security / | 1 |
TK5105.59 .O6531 2007eb | Issues in online security / | 1 |
TK5105.59 .O67 2005 | Extreme exploits : advanced defenses against hardcore hacks / | 1 |
TK5105.59 .O67 2009 | SSL and TLS : Theory and Practice. | 1 |
TK5105.59 .O67 2009eb |
SSL and TLS theory and practice / SSL and TLS : theory and practice / |
2 |