Explore: Network Security
Discover books, insights, and more — all in one place.
Learn more about Network Security with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “network-security”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Gray Hat Hacking
The Ethical Hacker's Handbook
By Shon Harris, Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle and Jonathan Ness

“Gray Hat Hacking” Metadata:
- Title: Gray Hat Hacking
- Authors: ➤ Shon HarrisAllen HarperDaniel RegaladoRyan LinnStephen SimsBranko SpasojevicLinda MartinezMichael BaucomChris EagleJonathan Ness
- Language: English
- Number of Pages: Median: 595
- Publisher: ➤ McGraw Hill - McGraw-Hill Osborne Media - McGraw-Hill/Osborne - McGraw-Hill - McGraw-Hill Education
- Publish Date: ➤ 2004 - 2005 - 2008 - 2011 - 2015 - 2018 - 2022
- Publish Location: New York
“Gray Hat Hacking” Subjects and Themes:
- Subjects: ➤ Computer hackers - Computer security - Hackers - Computer crimes - Networking - Internet - Security - COMPUTERS - General - Penetration testing (Computer security) - Handbooks, manuals - Hacking - Engineering & Applied Sciences - Computer Science - Computing & information technology - Computer networking & communications - Ethical & social aspects of IT - Computer fraud & hacking - Network security - Computers and IT
Edition Identifiers:
- The Open Library ID: ➤ OL36144432M - OL26837931M - OL26833180M - OL23906038M - OL25016642M - OL3440123M - OL9257247M - OL7302570M
- Online Computer Library Center (OCLC) ID: 748265658 - 659756242 - 182552993 - 57688548
- Library of Congress Control Number (LCCN): 2005299894 - 2007047838 - 2010053295
- All ISBNs: ➤ 9780071495684 - 9781264268948 - 0071742557 - 9780071832380 - 0072257091 - 0071832386 - 0071495681 - 1264268947 - 9780072257090 - 9780071742559 - 9781260108415 - 1260108414
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Gray Hat Hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Hacking exposed
By Stuart McClure, Joel Scambray and George Kurtz

“Hacking exposed” Metadata:
- Title: Hacking exposed
- Authors: Stuart McClureJoel ScambrayGeorge Kurtz
- Language: English
- Number of Pages: Median: 484
- Publisher: Computing Mcgraw-Hill
- Publish Date: 1999
“Hacking exposed” Subjects and Themes:
- Subjects: ➤ Computer security - Computer networks - Hacking - Computerbeveiliging - Security measures - Data protection - Computer fraud & hacking - Data security & data encryption - Network security - Reference works - Security measures - Computer security - Computer Data Security - Computers - Computers - Communications / Networking - Security - General - Computer Books And Software - Security - Networking - General - Computer Bks - Communications / Networking - Computer networks - Security measures
Edition Identifiers:
- The Open Library ID: OL7302141M - OL9256818M
- All ISBNs: 0072121270 - 9780072121278
Access and General Info:
- First Year Published: 1999
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Hacking exposed at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Computer Forensics
By John R. Vacca and John Vacca

“Computer Forensics” Metadata:
- Title: Computer Forensics
- Authors: John R. VaccaJohn Vacca
- Language: English
- Number of Pages: Median: 666
- Publisher: Charles River Media
- Publish Date: 2002
- Publish Location: Hingham, Mass
“Computer Forensics” Subjects and Themes:
- Subjects: ➤ Computer Software Packages - Data security & data encryption - Internet - Network security - Internet - Security - Computer security - Computer Books: General - Security - General - Computers - Computer Bks - General Information - Computers - General Information - Forensic sciences - Computer Books And Software - Forensic Science - Security - Security measures - Computer Science - Computer networks
Edition Identifiers:
- The Open Library ID: OL8793288M - OL22134096M
- Online Computer Library Center (OCLC) ID: 49260440
- Library of Congress Control Number (LCCN): 2002002583
- All ISBNs: 9781584500186 - 1584500182
First Setence:
"Electronic evidence and information gathering have become central issues in an increasing number of conflicts and crimes."
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Computer Forensics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Windows Internet security
By Seth Fogie and Cyrus Peikari

“Windows Internet security” Metadata:
- Title: Windows Internet security
- Authors: Seth FogieCyrus Peikari
- Language: English
- Number of Pages: Median: 400
- Publisher: Prentice Hall PTR
- Publish Date: 2001
“Windows Internet security” Subjects and Themes:
- Subjects: ➤ Sicherheit - Computer security - Internet - Security systems - Computer networks - Microsoft Windows (Computer file) - Windows 2000 - Security measures - Data security & data encryption - Internet - Network security - Microsoft Windows (Computer fi - Computers - Computer Data Security - Microcomputer Operating Environments - Operating Systems - Windows 2000 - Computers - Operating Systems - Textbooks - Computer Books: General - Internet - Security - Operating Systems - Windows - Computers / Security - Security - General - Security measures - Computer networks - Computer security - Windows (computer programs) - Internet, security measures
Edition Identifiers:
- The Open Library ID: OL7331776M - OL9286424M
- Library of Congress Control Number (LCCN): 2001059146
- All ISBNs: 0130428310 - 9780130428318
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Windows Internet security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Maximum wireless security
By Cyrus Peikari and Seth Fogie

“Maximum wireless security” Metadata:
- Title: Maximum wireless security
- Authors: Cyrus PeikariSeth Fogie
- Language: English
- Number of Pages: Median: 399
- Publisher: Pearson Education - Sams
- Publish Date: 2002 - 2003 - 2005
- Publish Location: ➤ [Great Britain] - Upper Saddle River - Indianapolis, Ind
“Maximum wireless security” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Security measures - Wireless LANs - Data security & data encryption - Network security - Data Transmission Systems - General - Computer Data Security - Data Transmission Standards And Protocols - Computers - Computers - Computer Security - Computer Books: General - Security - General - Networking - General - Computers / Data Transmission Systems / General - Networking - Network Protocols - Wireless communication systems - Computer security
Edition Identifiers:
- The Open Library ID: OL7668524M - OL22039678M - OL24260021M
- Library of Congress Control Number (LCCN): 2002115240
- All ISBNs: 0768663261 - 9780672324888 - 9780768663266 - 0672324881
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Maximum wireless security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Mapping security
By Tom Patterson and Scott Gleeson Blue

“Mapping security” Metadata:
- Title: Mapping security
- Authors: Tom PattersonScott Gleeson Blue
- Language: English
- Number of Pages: Median: 419
- Publisher: ➤ Addison-Wesley Professional - Addison-Wesley
- Publish Date: 2004 - 2005
- Publish Location: London - Boston
“Mapping security” Subjects and Themes:
- Subjects: ➤ Data security & data encryption - Network security - Computer Data Security - International Business Administration - Computers - Computers - Computer Security - Computer Books: General - Security - General - Computers / Internet / Security - International - General - Computer networks - Electronic commerce - International business enterprises - Internet - Security measures - Computer security - Corporate planning
Edition Identifiers:
- The Open Library ID: OL9554400M - OL22156643M
- Online Computer Library Center (OCLC) ID: 57550889
- Library of Congress Control Number (LCCN): 2004113324
- All ISBNs: 0321304527 - 9780321304520
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Mapping security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7JUNOS Enterprise Routing
By Doug Marschke and Harry Reynolds

“JUNOS Enterprise Routing” Metadata:
- Title: JUNOS Enterprise Routing
- Authors: Doug MarschkeHarry Reynolds
- Language: English
- Number of Pages: Median: 783
- Publisher: ➤ O'reilly - O'Reilly Media, Inc. - O'Reilly Media, Incorporated
- Publish Date: 2008
- Publish Location: Cambridge [Mass.] - Beijing
“JUNOS Enterprise Routing” Subjects and Themes:
- Subjects: ➤ Computer network protocols - Computer networks - Equipment and supplies - Inc Juniper Networks - Routers (Computer networks) - Computing and Information Technology - Network security - Data Transmission Standards And Protocols - Computers - Computers - Communications / Networking - Computer Books: General - Networking - Intranets & Extranets - Networking - Network Protocols - Computers / Communications / Networking - Computers / Internet / Intranets - Computers/Networking - Network Protocols - routing, tcp/ip, internet, juniper, junos, enterprise, certification, cisco, ccie, jncia, jncis, jncie - Study guides, home study & revision notes - Computer software, certification
Edition Identifiers:
- The Open Library ID: OL36797530M - OL18608879M - OL20749872M - OL10781008M - OL36706376M
- Online Computer Library Center (OCLC) ID: 297576356 - 182528778
- Library of Congress Control Number (LCCN): 2008299424
- All ISBNs: ➤ 0596551703 - 0596514425 - 9780596514426 - 9780596551704 - 9780596522254 - 0596522258
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find JUNOS Enterprise Routing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8The security development lifecycle
By Michael Howard, Michael Howard and Steve Lipner

“The security development lifecycle” Metadata:
- Title: ➤ The security development lifecycle
- Authors: Michael HowardMichael HowardSteve Lipner
- Language: English
- Number of Pages: Median: 336
- Publisher: Microsoft Press
- Publish Date: 2006
- Publish Location: Redmond, Wash
“The security development lifecycle” Subjects and Themes:
- Subjects: ➤ Computer software - Development - Reliability - Computer security - Data security & data encryption - Network security - Computers - Computer Data Security - Computers - Computer Security - Computer Books: General - Security - General - Computers / General
Edition Identifiers:
- The Open Library ID: OL17205823M - OL7891206M
- Online Computer Library Center (OCLC) ID: 73814382
- Library of Congress Control Number (LCCN): 2006924466
- All ISBNs: 0735622140 - 9780735622142
First Setence:
"The adage "Necessity is the mother of invention" sums up the birth of the Security Development Lifecycle (SDL) at Microsoft."
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find The security development lifecycle at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9IPSec
By Naganand Doraswamy and Dan Harkins

“IPSec” Metadata:
- Title: IPSec
- Authors: Naganand DoraswamyDan Harkins
- Language: English
- Number of Pages: Median: 216
- Publisher: Prentice Hall PTR
- Publish Date: 1999
“IPSec” Subjects and Themes:
- Subjects: ➤ Extranets (Computer networks) - Intranets (Computer networks) - Internet - Computer networks - Security measures - IPSec (Computer network protocol) - Data security & data encryption - Network security - Security - IPSec (Computer network protocol) - Computer Data Security - Security measures - Computers - Computer - Internet - Networking - General - Computer Books: General - Intranets (Computer networks) - Internet - Internet - Security - Security - General - Computer Bks - Internet - Internet, security measures - Intranets (computer networks) - Computer security - Extranets (computer networks)
Edition Identifiers:
- The Open Library ID: OL9284526M - OL7329878M
- Library of Congress Control Number (LCCN): 99023833
- All ISBNs: 0130118982 - 9780130118981
Access and General Info:
- First Year Published: 1999
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find IPSec at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Developing trust
By Matt Curtin and Peter G. Neumann

“Developing trust” Metadata:
- Title: Developing trust
- Authors: Matt CurtinPeter G. Neumann
- Language: English
- Number of Pages: Median: 293
- Publisher: ➤ Apress - Distributed to the book trade in the United States by Springer-Verlag New York
- Publish Date: 2001 - 2002
- Publish Location: New York, NY - Berkeley, CA
“Developing trust” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Right of Privacy - Security measures - Databases & data structures - Network security - Security - General - Computer Data Security - Computers - Computer - Internet - Computer Books: Database - Networking - General - Internet - Security - Internet, security measures - Computer Security - Réseaux d'ordinateurs - Sécurité - Mesures - Sécurité informatique - Computersicherheit - Internet
Edition Identifiers:
- The Open Library ID: OL22466534M - OL8720765M
- Online Computer Library Center (OCLC) ID: 48916376
- All ISBNs: 9781893115729 - 1893115720
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Developing trust at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11TICSA TruSecure ICSA certified security associate
By Mike Chapple, Debra Littlejohn Shinder and Shawn Porter

“TICSA TruSecure ICSA certified security associate” Metadata:
- Title: ➤ TICSA TruSecure ICSA certified security associate
- Authors: Mike ChappleDebra Littlejohn ShinderShawn Porter
- Language: English
- Number of Pages: Median: 558
- Publisher: Pearson Education - Que
- Publish Date: 2002 - 2003 - 2005
- Publish Location: ➤ Upper Saddle River - [Indianapolis, Ind.]
“TICSA TruSecure ICSA certified security associate” Subjects and Themes:
- Subjects: ➤ Certification - Computer Technology - Computer security - Electronic data processing personnel - Examinations - Nonfiction - Study guides - Data security & data encryption - Network security - Social & Legal Aspects of Computing - Computer Data Security - Computers - Computers - Computer Security - Computer Books: General - Electronic data processing per - Certification Guides - General - Security - General - Tests - Computers / Technical Skills - Computer science
Edition Identifiers:
- The Open Library ID: OL8157549M - OL24246985M - OL3571407M
- Online Computer Library Center (OCLC) ID: 50766859
- Library of Congress Control Number (LCCN): 2002091627
- All ISBNs: 9780789727831 - 9780768661026 - 0768661021 - 0789727838
Author's Alternative Names:
"Debra LittleJohn Shinder"Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find TICSA TruSecure ICSA certified security associate at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Voice and data security
By David Dicenso, Dwayne Williams, Travis Good, Kevin Archer, Gregory White, Chuck Cothren and Roger Davis

“Voice and data security” Metadata:
- Title: Voice and data security
- Authors: ➤ David DicensoDwayne WilliamsTravis GoodKevin ArcherGregory WhiteChuck CothrenRoger Davis
- Language: English
- Number of Pages: Median: 494
- Publisher: SAMS - Sams
- Publish Date: 2001
- Publish Location: Indianapolis, Ind
“Voice and data security” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Security measures - Telephone systems - Data security & data encryption - Network security - Telecommunications - Data Processing - Speech & Audio Processing - Telephone Engineering - Computer Data Security - Security - Computers - Computers - Communications / Networking - Computers - Computer Security - Computer Books: General - Networking - General - Security - General - Data protection
Edition Identifiers:
- The Open Library ID: OL24223133M - OL7668339M
- Online Computer Library Center (OCLC) ID: 46944809
- Library of Congress Control Number (LCCN): 01067595 - 2001087595
- All ISBNs: 9780672321504 - 0672321505
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Voice and data security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Implementing security for ATM networks
By Thomas D. Tarman and Edward L. Witzke

“Implementing security for ATM networks” Metadata:
- Title: ➤ Implementing security for ATM networks
- Authors: Thomas D. TarmanEdward L. Witzke
- Language: English
- Number of Pages: Median: 306
- Publisher: ➤ Artech House Publishers - Artech House
- Publish Date: 2001 - 2002
- Publish Location: Boston
“Implementing security for ATM networks” Subjects and Themes:
- Subjects: ➤ Asynchronous transfer mode - Computer networks - Security measures - Network security - Networking - General - Computers - Computer Data Security - Integrated Services Digital Networks (Isdn) - Computers - Computer Security - Computer Books: Database - Data Transmission Systems - General - Security - General - Computer Bks - Communications / Networking - Data Transmission Systems - Broadband - ATM - Netzwerk - Sicherheit
Edition Identifiers:
- The Open Library ID: OL18481571M - OL8780180M
- Library of Congress Control Number (LCCN): 2001053535
- All ISBNs: 1580532934 - 9781580532938
First Setence:
"A general discussion of network security is in order before describing security approaches and mechanisms specific to asynchronous transfer mode(ATM) networks."
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Implementing security for ATM networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Cisco Networking Academy Program
By Cisco Systems, Inc, Cisco Systems Inc. and Cisco Networking Academy Program

“Cisco Networking Academy Program” Metadata:
- Title: ➤ Cisco Networking Academy Program
- Authors: ➤ Cisco Systems, IncCisco Systems Inc.Cisco Networking Academy Program
- Language: English
- Number of Pages: Median: 851
- Publisher: Cisco Press
- Publish Date: 2003 - 2004
- Publish Location: Indianapolis, Ind
“Cisco Networking Academy Program” Subjects and Themes:
- Subjects: ➤ Textbooks - Computer networks - Problems, exercises - Security measures - Network security - Networking - General - Computer Data Security - Microcomputer Networks - Computers - Computers - Computer Security - Computer Books And Software - Security - General - Computers / Networking / General - Computer security
Edition Identifiers:
- The Open Library ID: OL8822329M - OL3698958M
- Online Computer Library Center (OCLC) ID: 53068115
- Library of Congress Control Number (LCCN): 2003114381
- All ISBNs: 9781587131226 - 1587131226
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Cisco Networking Academy Program at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Microsoft Internet security and acceleration (ISA) server 2000
By Jason Ballard, Jason Ballard and Bud Ratliff

“Microsoft Internet security and acceleration (ISA) server 2000” Metadata:
- Title: ➤ Microsoft Internet security and acceleration (ISA) server 2000
- Authors: Jason BallardJason BallardBud Ratliff
- Language: English
- Number of Pages: Median: 351
- Publisher: Microsoft Press
- Publish Date: 2003
- Publish Location: Redmond, Wash
“Microsoft Internet security and acceleration (ISA) server 2000” Subjects and Themes:
- Subjects: ➤ Computer networks - Software - Security measures - Computer security - Internet - Data security & data encryption - Network security - Security - General - Computers - Computer Books: Internet General - Computer - Internet - Operating Systems - General - Internet - Security - Computers / General - Computer Bks - Internet - Internet - General
Edition Identifiers:
- The Open Library ID: OL23999839M - OL7890879M
- Library of Congress Control Number (LCCN): 2003050977
- All ISBNs: 9780735614420 - 0735614423
First Setence:
"This chapter introduces the basic functions that Microsoft Internet Security and Acceleration Server 2000 performs, explaining how it can function as either a caching or firewall product, or both."
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Microsoft Internet security and acceleration (ISA) server 2000 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Wireless networking
By Maryellen Mott Allen and Louise E. Alcorn

“Wireless networking” Metadata:
- Title: Wireless networking
- Authors: Maryellen Mott AllenLouise E. Alcorn
- Language: English
- Number of Pages: Median: 201
- Publisher: Neal-Schuman Publishers
- Publish Date: 2004 - 2006
- Publish Location: New York
“Wireless networking” Subjects and Themes:
- Subjects: ➤ Library information networks - Public libraries - Telecommunication in libraries - Wireless communication systems - Academic libraries - Information technology - Automation of library & information processes - Network security - Library & Information Science - Technology - Reference - Science/Mathematics - Engineering - Electrical & Electronic - Networking - Network Protocols - Library science, data processing
Edition Identifiers:
- The Open Library ID: OL3307740M - OL8574805M
- Online Computer Library Center (OCLC) ID: 55657674
- Library of Congress Control Number (LCCN): 2004053760
- All ISBNs: 1555704786 - 9781555704780
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Wireless networking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Deploying virtual private networks with Microsoft Windows Server 2003
By Joseph Davies

“Deploying virtual private networks with Microsoft Windows Server 2003” Metadata:
- Title: ➤ Deploying virtual private networks with Microsoft Windows Server 2003
- Author: Joseph Davies
- Language: English
- Number of Pages: Median: 453
- Publisher: Microsoft Press
- Publish Date: 2003
“Deploying virtual private networks with Microsoft Windows Server 2003” Subjects and Themes:
- Subjects: ➤ Microsoft Windows server - Extranets (Computer networks) - Operating Systems - Windows - Computers - Communications / Networking - Networking - General - Hardware - Personal Computers - General - Client-Server Computing - Windows - Computers / General - Computer Books And Software - Security - General - Data security & data encryption - Network security - Computer Data Security - Microcomputer Application Software - Computers
Edition Identifiers:
- The Open Library ID: OL7890947M
- Library of Congress Control Number (LCCN): 2003042174
- All ISBNs: 9780735615762 - 0735615764
First Setence:
"Welcome to Deploying Virtual Private Networks with Microsoft Windows Server 2003, your complete source for the information you need to design and deploy Virtual Private Networks (VPNs) using Windows Server 2003 and all of the Windows Client operating systems."
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Deploying virtual private networks with Microsoft Windows Server 2003 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Mastering network security
By Chris Brenton and Cameron Hunt

“Mastering network security” Metadata:
- Title: Mastering network security
- Authors: Chris BrentonCameron Hunt
- Language: English
- Number of Pages: Median: 672
- Publisher: ➤ SYBEX - John Wiley & Sons, Ltd. - Sybex - Network - Wiley & Sons, Incorporated, John
- Publish Date: 1998 - 2002 - 2003 - 2006
- Publish Location: ➤ New York - London - San Francisco, Calif
“Mastering network security” Subjects and Themes:
- Subjects: ➤ Computer Technology - Computer networks - Computer security - Data protection - Nonfiction - Security measures - Networking - COMPUTERS - General - Internet - Security - Data security & data encryption - Network security - Computers - Computer Security - Computer Data Security - Microcomputer Networks - Computer Books: General - Security - General - Networking - General - Computers / Security - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL24265867M - OL39884225M - OL8096564M - OL398234M - OL22445777M
- Online Computer Library Center (OCLC) ID: 745061767 - 40647147
- Library of Congress Control Number (LCCN): 98087201 - 2002108077
- All ISBNs: ➤ 0782151485 - 0782141420 - 9781280650055 - 9780782151480 - 9780782141429 - 0782123430 - 9780782123432 - 1280650052
First Setence:
"WE ALL PROBABLY HAVE an idea about what the word system means."
Access and General Info:
- First Year Published: 1998
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Mastering network security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Phishing Exposed
By Lance James

“Phishing Exposed” Metadata:
- Title: Phishing Exposed
- Author: Lance James
- Language: English
- Number of Pages: Median: 450
- Publisher: ➤ Elsevier Science & Technology Books - Syngress
- Publish Date: 2005
“Phishing Exposed” Subjects and Themes:
- Subjects: ➤ Phishing - Internet fraud - Identity theft - Network security - Computers - General Information - Computers - Computer Books: General - General - Computer security - Computers / General - Computers / General Information - Computers / Security - Phisher, Phishing, Anti-Phishing, Malware, Berbew, Mitgleider, Trojan, download, win32.Show, FSG, ASPACK, Forensics, Author analysis, research, spam research, phishing research, intelligence, Secure Science Corporation, Lance James, email scams, identity theft, spam, phishers - Prevention - True Crime/General - Security - General - Criminalitâe informatique - Mesures - Râeseaux d'ordinateurs - Sâecuritâe - Internet, security measures - Electronic commerce - Electronic mail systems - Security measures
Edition Identifiers:
- The Open Library ID: OL35750190M - OL8894012M
- Online Computer Library Center (OCLC) ID: 62408539 - 824876115
- All ISBNs: 159749030X - 9781597490306 - 0080489532 - 9780080489537
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Phishing Exposed at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20The shellcoder's handbook
By Jack Koziol, David Litchfield, Dave Aitel, Chris Anley, Sinan "noir" Eren, Neel Mehta and Riley Hassell

“The shellcoder's handbook” Metadata:
- Title: The shellcoder's handbook
- Authors: ➤ Jack KoziolDavid LitchfieldDave AitelChris AnleySinan "noir" ErenNeel MehtaRiley Hassell
- Language: English
- Number of Pages: Median: 698
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley Pub. - Wiley
- Publish Date: 2004 - 2007 - 2011
- Publish Location: Indianapolis, IN
“The shellcoder's handbook” Subjects and Themes:
- Subjects: ➤ Computer security - Data protection - Risk assessment - Network security - Computers - Computer Security - Computer Bks - General Information - Computer Data Security - Computers - Computer Books And Software - Computer Books: General - Security - General - Computers / Security
Edition Identifiers:
- The Open Library ID: OL39894690M - OL29074249M - OL29074231M - OL8042591M - OL15551212M
- Online Computer Library Center (OCLC) ID: 53993005 - 699852680
- Library of Congress Control Number (LCCN): 2003027629
- All ISBNs: ➤ 9780764544682 - 9781118080450 - 9781118079126 - 0764544683 - 1280935472 - 9781280935473 - 1118079124 - 1118080459
First Setence:
"In order to understand the content of this book, you need a well-developed understanding of computer languages, operating systems, and architectures."
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The shellcoder's handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21Mainframe basics for security professionals
By Ori Pomerantz, Barbara Vander Weele, Mark Nelson and Tim Hahn

“Mainframe basics for security professionals” Metadata:
- Title: ➤ Mainframe basics for security professionals
- Authors: Ori PomerantzBarbara Vander WeeleMark NelsonTim Hahn
- Language: English
- Number of Pages: Median: 174
- Publisher: ➤ Pearson Education, Limited - IBM Press - IBM Press/Pearson - IBM Pr
- Publish Date: 2007 - 2008
- Publish Location: ➤ Upper Saddle River, N.J - Upper Saddle River, NJ
“Mainframe basics for security professionals” Subjects and Themes:
- Subjects: ➤ Electronic digital computers - Z/OS - Computer security - Network security - Computers - Computer - Internet - Computer Books: Internet General - Hardware - Personal Computers - General - Internet - Security - Computers / Internet / Security - Computer security - Electronic digital computers
Edition Identifiers:
- The Open Library ID: ➤ OL50173723M - OL35570943M - OL35567854M - OL29181196M - OL10083012M - OL18840829M
- Online Computer Library Center (OCLC) ID: 297576631
- Library of Congress Control Number (LCCN): 2007044290
- All ISBNs: ➤ 9780132704342 - 9780131738560 - 0137137583 - 9780137137596 - 0131738569 - 9780137137589 - 013270434X - 9780133763041 - 0133763048 - 0137137591
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Mainframe basics for security professionals at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22The Network Security Test Lab
By Michael Gregg

“The Network Security Test Lab” Metadata:
- Title: The Network Security Test Lab
- Author: Michael Gregg
- Language: English
- Number of Pages: Median: 480
- Publisher: ➤ Wiley - Wiley & Sons, Incorporated, John
- Publish Date: 2015
“The Network Security Test Lab” Subjects and Themes:
- Subjects: ➤ network security - computer security - computer forensics - malware - Computer networks, security measures - Computer security - Evaluation - Computer networks - Security measures
- People: Michael Gregg
Edition Identifiers:
- The Open Library ID: OL29289515M - OL26435625M - OL29289555M
- Online Computer Library Center (OCLC) ID: 891126187
- Library of Congress Control Number (LCCN): 2015946971
- All ISBNs: ➤ 9781118987131 - 1118987152 - 9781118987056 - 1118987055 - 1118987136 - 9781118987155
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Network Security Test Lab at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23Securing VoIP networks
By Peter Thermos and Ari Takanen

“Securing VoIP networks” Metadata:
- Title: Securing VoIP networks
- Authors: Peter ThermosAri Takanen
- Language: English
- Number of Pages: Median: 359
- Publisher: ➤ Pearson Education, Limited - Addison-Wesley - Addison-Wesley Professional
- Publish Date: 2007 - 2008
- Publish Location: ➤ Boston, MA - Upper Saddle River, NJ
“Securing VoIP networks” Subjects and Themes:
- Subjects: ➤ Internet telephony - Security measures - Network security - Computers - Computer - Internet - Computers - Computer Security - Computer Books: Internet General - Networking - General - Security - General - Computers / Internet / Security - Internet - Security - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL35569146M - OL9802245M - OL18498154M - OL22767543M
- Online Computer Library Center (OCLC) ID: 123955114 - 172622934
- Library of Congress Control Number (LCCN): 2007017689
- All ISBNs: 9780321524966 - 0321524969 - 9780321437341 - 0321437349
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Securing VoIP networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24CCSP self-study
By Grey, Paul CCIE., Ido Dubrawsky and Paul Grey

“CCSP self-study” Metadata:
- Title: CCSP self-study
- Authors: Grey, Paul CCIE.Ido DubrawskyPaul Grey
- Language: English
- Number of Pages: Median: 508
- Publisher: Cisco - Cisco Press
- Publish Date: 2004 - 2005
- Publish Location: Indianapolis, Ind
“CCSP self-study” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Computing and Information Technology - Data security & data encryption - Network security - Networking - Security - Computers - Computers - Certification - Computer Books: Internet General - Certification Guides - Cisco - Computers / Internet / Security - Internet - Security - Extranets (computer networks) - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL3314955M - OL8823144M
- Online Computer Library Center (OCLC) ID: 57200207
- Library of Congress Control Number (LCCN): 2004107545
- All ISBNs: 1587201321 - 9781587201325
Author's Alternative Names:
"Ido Dubrawski"Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find CCSP self-study at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Understanding PKI
By Carlisle Adams, Carlisle Adams and Steve Lloyd

“Understanding PKI” Metadata:
- Title: Understanding PKI
- Authors: Carlisle AdamsCarlisle AdamsSteve Lloyd
- Language: English
- Number of Pages: Median: 352
- Publisher: ➤ Pearson Education, Limited - Addison-Wesley Professional - Addison-Wesley
- Publish Date: 2002 - 2003
- Publish Location: Boston
“Understanding PKI” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Business enterprises - Public key infrastructure (Computer security) - Data security & data encryption - Network security - Cryptography/Access Control - Computers - Computers - Computer Security - Security - General - Computer Books: General - Networking - General - Computers / Internet / Security - Public key infrastructure (Com - Computer security - Computer networks, security measures - Business enterprises, computer networks - Business enterprises--computer networks--security measures - Computer networks--security measures - Public key infrastructure (computer security) - Qa76.9.a25 a346 2003 - 005.8
Edition Identifiers:
- The Open Library ID: OL21169862M - OL7668473M - OL28998865M
- Online Computer Library Center (OCLC) ID: 50198373
- Library of Congress Control Number (LCCN): 2002074687
- All ISBNs: 9780321743091 - 0672323915 - 0321743091 - 9780672323911
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Understanding PKI at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Disseminating security updates at Internet scale
By Jun Li, Jun Li, Peter Reiher and Gerald J. Popek

“Disseminating security updates at Internet scale” Metadata:
- Title: ➤ Disseminating security updates at Internet scale
- Authors: Jun LiJun LiPeter ReiherGerald J. Popek
- Language: English
- Number of Pages: Median: 174
- Publisher: ➤ Kluwer Academic Publishers - Springer
- Publish Date: 2002 - 2003 - 2012
- Publish Location: Boston
“Disseminating security updates at Internet scale” Subjects and Themes:
- Subjects: ➤ Security measures - Computer networks - Internet - Push technology (Computer networks) - Computer security - Data security & data encryption - Network security - Internet - General - Security - General - Computer Data Security - Computers - Computers - Computer Security - Computer Books: General - General - Computers / Computer Science - Push technology (Computer netw - Computer Bks - General Information - Computer networks, security measures - Internet, security measures - Push technology (computer networks)
Edition Identifiers:
- The Open Library ID: OL8372538M - OL19288818M - OL28136147M
- Library of Congress Control Number (LCCN): 2002035710
- All ISBNs: 9781461353553 - 1461353556 - 1402073054 - 9781402073052
First Setence:
"Over the years the Internet has been seriously challenged by various threats: break-ins, attacks, hoaxes, vulnerabilities, and other malicious subversion efforts."
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Disseminating security updates at Internet scale at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Cisco Asa
By Frahim, Jazib/ Santos, Omar, Omar Santos and Jazib Frahim

“Cisco Asa” Metadata:
- Title: Cisco Asa
- Authors: Frahim, Jazib/ Santos, OmarOmar SantosJazib Frahim
- Language: English
- Number of Pages: Median: 1044
- Publisher: ➤ Pearson Education, Limited - Cisco Press - Macmillan Technical Pub
- Publish Date: 2005 - 2006 - 2014
“Cisco Asa” Subjects and Themes:
- Subjects: ➤ Data security & data encryption - Internet - Network security - Computers - Computer Data Security - Computer Network Management - Computer - Internet - Computer Books: General - Security - General - Internet - Security - Certification Guides - Cisco - Computers / Internet / Security - Networking - General - Computer networks, security measures - Computer networks - Security measures - Firewalls (Computer security)
Edition Identifiers:
- The Open Library ID: OL54048783M - OL35518959M - OL8822253M - OL23091021M
- Library of Congress Control Number (LCCN): 2004108505
- All ISBNs: ➤ 1587140985 - 9780132954419 - 9781587052095 - 9781587140983 - 0132954419 - 1587052091
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cisco Asa at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Hacking exposed Web 2.0
By Rich Cannings and Himanshu Dwivedi

“Hacking exposed Web 2.0” Metadata:
- Title: Hacking exposed Web 2.0
- Authors: Rich CanningsHimanshu Dwivedi
- Language: English
- Number of Pages: Median: 357
- Publisher: ➤ McGraw-Hill Osborne Media - McGraw-Hill
- Publish Date: 2007 - 2008
- Publish Location: New York - New York, NY
“Hacking exposed Web 2.0” Subjects and Themes:
- Subjects: ➤ Ajax (Web site development technology) - Computer Technology - Computer networks - Nonfiction - Security measures - Web sites - Network security - Non-Classifiable - Computers - Computer Security - Novelty - Security - General - Computers / Security - Computer networks, security measures - Ajax (web site development technology)
Edition Identifiers:
- The Open Library ID: OL18340302M - OL9634249M - OL24264572M
- Online Computer Library Center (OCLC) ID: 166624812
- Library of Congress Control Number (LCCN): 2007047047
- All ISBNs: 9780071494618 - 9780071595483 - 0071595481 - 0071494618
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Hacking exposed Web 2.0 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Real 802.11 security
By Jon Edney and William A. Arbaugh

“Real 802.11 security” Metadata:
- Title: Real 802.11 security
- Authors: Jon EdneyWilliam A. Arbaugh
- Language: English
- Number of Pages: Median: 480
- Publisher: ➤ Addison-Wesley - Addison-Wesley Professional
- Publish Date: 2003 - 2004
- Publish Location: Boston, MA
“Real 802.11 security” Subjects and Themes:
- Subjects: ➤ IEEE 802.11 (Standard) - Security measures - Wireless LANs - Communications engineering / telecommunications - Network security - Networking standards & protocols - Computer Data Security - Computers - Computers - Computer Security - Computer Books: General - Security - General - Computers / Internet / Security - Internet - General - Networking - Local Area Networks (LANs) - Lokales Netz - Sicherheit - Computer security
Edition Identifiers:
- The Open Library ID: OL3686297M - OL9561244M
- Library of Congress Control Number (LCCN): 2003049595
- All ISBNs: 0321136209 - 9780321136206
First Setence:
"Broadcast radio and, later, broadcast TV have defined wireless for two generations."
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Real 802.11 security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Role-based access controls
By David Ferraiolo, David F. Ferraiolo, D. Richard Kuhn and Ramaswamy Chandramouli

“Role-based access controls” Metadata:
- Title: Role-based access controls
- Authors: David FerraioloDavid F. FerraioloD. Richard KuhnRamaswamy Chandramouli
- Language: English
- Number of Pages: Median: 327
- Publisher: ➤ Artech House - Artech House Publishers
- Publish Date: 2003
- Publish Location: Boston
“Role-based access controls” Subjects and Themes:
- Subjects: ➤ Access control - Computer networks - Computers - Computer security - Network security - Technology - Computers - Computer Security - Security - General - Science/Mathematics - E-Commerce - General - Networking - General - Telecommunications
Edition Identifiers:
- The Open Library ID: OL8780232M - OL22491011M
- Library of Congress Control Number (LCCN): 2003041492
- All ISBNs: 1580533701 - 9781580533706
First Setence:
"Access control-or authorization, in its broadest sense-has existed as a concept for as long as humans have had assets worth protecting."
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Role-based access controls at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31Computer and intrusion forensics
By George Mohay, Alison Anderson, Byron Collie, Olivier de Vel and Rod McKemmish

“Computer and intrusion forensics” Metadata:
- Title: ➤ Computer and intrusion forensics
- Authors: George MohayAlison AndersonByron CollieOlivier de VelRod McKemmish
- Language: English
- Number of Pages: Median: 408
- Publisher: ➤ Artech House - Artech House Publishers
- Publish Date: 2003
- Publish Location: Boston - London
“Computer and intrusion forensics” Subjects and Themes:
- Subjects: ➤ Computer security - Data protection - Forensic sciences - Computer fraud & hacking - Criminal investigation & detection - Network security - Medical - Forensic Medicine - Technology & Industrial Arts - Security - General - E-Commerce - General - General - Business & Economics-E-Commerce - General - Computers-Security - General - Technology / General
Edition Identifiers:
- The Open Library ID: OL22108029M - OL8780231M
- Library of Congress Control Number (LCCN): 2002044071
- All ISBNs: 9781580533690 - 1580533698
First Setence:
""Computers undeniably make a large part of human activity faster, safer, and more interesting.""
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer and intrusion forensics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Cisco NAC appliance
By Jamey Heary, Chad Sullivan, Alok Agrawal and Jerry Lin

“Cisco NAC appliance” Metadata:
- Title: Cisco NAC appliance
- Authors: Jamey HearyChad SullivanAlok AgrawalJerry Lin
- Language: English
- Number of Pages: Median: 559
- Publisher: ➤ Pearson Education, Limited - Cisco Press
- Publish Date: 2007 - 2008
- Publish Location: Indianapolis, Ind
“Cisco NAC appliance” Subjects and Themes:
- Subjects: ➤ Access control - Computer networks - Computers - Security measures - Network security - Computer - Internet - Computers - Computer Security - Computer Books: Internet General - Internet - Security - Networking - General - Security - General - Computers / Internet / Security - Computer networks, security measures - Computers, access control
Edition Identifiers:
- The Open Library ID: OL34787475M - OL8822285M - OL18276748M
- Online Computer Library Center (OCLC) ID: 153597810 - 172622796
- Library of Congress Control Number (LCCN): 2007026204
- All ISBNs: 9781587054808 - 1587054809 - 1587053063 - 9781587053061
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cisco NAC appliance at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33Cisco Network Admission Control
By Jazib Frahim, Denise Helfrich, Lou Ronnau, Jason Frazier and Paul Forbes

“Cisco Network Admission Control” Metadata:
- Title: ➤ Cisco Network Admission Control
- Authors: Jazib FrahimDenise HelfrichLou RonnauJason FrazierPaul Forbes
- Language: English
- Number of Pages: Median: 264
- Publisher: Cisco - Cisco Press
- Publish Date: 2006 - 2007
- Publish Location: London - Indianapolis, Ind
“Cisco Network Admission Control” Subjects and Themes:
- Subjects: ➤ Access control - Computer networks - Security measures - Network security - Internet - Security - Data Transmission Standards And Protocols - Computers - Computers - Communications / Networking - Computer Books: General - Networking - General - Computers / Internet / Security - Networking - Network Protocols
Edition Identifiers:
- The Open Library ID: OL8822269M - OL17983868M - OL17939212M
- Online Computer Library Center (OCLC) ID: 85872627 - 72150672 - 85872629
- Library of Congress Control Number (LCCN): 2004114756 - 2005923482
- All ISBNs: 9781587052255 - 1587052253 - 9781587052415 - 1587052415
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cisco Network Admission Control at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34SSL and Remote Access VPNs
By Jazib Frahim, Quiang Huang and Aamir Waheed

“SSL and Remote Access VPNs” Metadata:
- Title: SSL and Remote Access VPNs
- Authors: Jazib FrahimQuiang HuangAamir Waheed
- Language: English
- Number of Pages: Median: 349
- Publisher: Cisco Systems - Cisco Press
- Publish Date: 2008
- Publish Location: ➤ Indianapolis, IN - Indianapolis, Ind
“SSL and Remote Access VPNs” Subjects and Themes:
- Subjects: ➤ Computer networks - Extranets (Computer networks) - Remote access - Security measures - Network security - Computers - Computer - Internet - Computer Books: Internet General - Internet - Security - Computers / Internet / Security - World wide web - Computer network protocols - Extranets (computer networks)
Edition Identifiers:
- The Open Library ID: OL50173775M - OL12320490M - OL21478268M
- Online Computer Library Center (OCLC) ID: 297574696
- Library of Congress Control Number (LCCN): 2005923483
- All ISBNs: 1587052423 - 0768681952 - 9781587052422 - 9780768681956
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find SSL and Remote Access VPNs at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Microsoft Windows server 2003 security administrator's companion
By Mike Danseglio and Roberta Bragg

“Microsoft Windows server 2003 security administrator's companion” Metadata:
- Title: ➤ Microsoft Windows server 2003 security administrator's companion
- Authors: Mike DanseglioRoberta Bragg
- Language: English
- Number of Pages: Median: 500
- Publisher: Microsoft Press
- Publish Date: 2003 - 2004
- Publish Location: Redmond, Wash
“Microsoft Windows server 2003 security administrator's companion” Subjects and Themes:
- Subjects: ➤ Computer security - Microsoft Windows server - Operating systems (Computers) - Microsoft Windows - Network security - Security - Hardware - Personal Computers - General - Computer Data Security - Microcomputer Application Software - Computers - Computers - General Information - Computer Books: General - Operating Systems - Windows - Client-Server Computing - General - Computers / General - Security - General
Edition Identifiers:
- The Open Library ID: OL3683677M - OL7890946M
- Online Computer Library Center (OCLC) ID: 51653201
- Library of Congress Control Number (LCCN): 2003043644
- All ISBNs: 0735615748 - 9780735615748
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Microsoft Windows server 2003 security administrator's companion at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Computer and network security in higher education
By Mark A. Luker and Rodney Petersen

“Computer and network security in higher education” Metadata:
- Title: ➤ Computer and network security in higher education
- Authors: Mark A. LukerRodney Petersen
- Language: English
- Number of Pages: Median: 128
- Publisher: Jossey-Bass
- Publish Date: 2003
- Publish Location: San Francisco
“Computer and network security in higher education” Subjects and Themes:
- Subjects: ➤ Higher Education - Effect of technological innovations on - Computer security - Computer networks - Security measures - Universities and colleges - Colleges of higher education - Educational resources & technology - Network security - Language Arts & Disciplines - Reference - Language - Library & Information Science - Administration - General - Computers & Technology - Language Arts & Disciplines / Library & Information Science - United States - Education, Higher - Education, data processing - Universities and colleges, administration - Education, thailand
- Places: United States
Edition Identifiers:
- The Open Library ID: OL18206447M - OL8149048M
- Online Computer Library Center (OCLC) ID: 223229008 - 52514388
- Library of Congress Control Number (LCCN): 2003014534
- All ISBNs: 9780787966669 - 0787966665
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer and network security in higher education at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37Inside network perimeter security
By Stephen Northcutt, Mark T. Edmead, Lenny Zeltser, Scott Winters, Karen Fredrick and Ronald W. Ritchey

“Inside network perimeter security” Metadata:
- Title: ➤ Inside network perimeter security
- Authors: ➤ Stephen NorthcuttMark T. EdmeadLenny ZeltserScott WintersKaren FredrickRonald W. Ritchey
- Language: English
- Number of Pages: Median: 664
- Publisher: New Riders - Sams
- Publish Date: 2002 - 2003
- Publish Location: Indianapolis, Ind
“Inside network perimeter security” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Network security - Networking - General - Computer Data Security - Computers - Computers - Communications / Networking - Computers - Computer Security - Computer Books: General - Computer security - Security - General - Computers / Internet / Security - Firewall - Firewalls (Computer security) - Virtual Private Network (VPN)
Edition Identifiers:
- The Open Library ID: OL7891514M - OL18210683M
- Library of Congress Control Number (LCCN): 2001096722
- All ISBNs: 0735712328 - 9780735712324
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Inside network perimeter security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38Hack Proofing Your Network
By Ken Pfeil, Dan Kaminsky, Rain Forest Puppy, Joe Grand, David Ahmad, Hal Flynn, Ido Dubrawsky, Steve W. Manzuik and Ryan Permeh

“Hack Proofing Your Network” Metadata:
- Title: Hack Proofing Your Network
- Authors: ➤ Ken PfeilDan KaminskyRain Forest PuppyJoe GrandDavid AhmadHal FlynnIdo DubrawskySteve W. ManzuikRyan Permeh
- Language: English
- Number of Pages: Median: 824
- Publisher: Syngress
- Publish Date: 2002
“Hack Proofing Your Network” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Computer fraud & hacking - Data security & data encryption - Network security - Internet - Security - Networking - General - Computer security - Security - General - Computers - Computers - Computer Security - Computer Books: General - Internet - General - Computers / Computer Security - Computers / Security - Computers/Internet - General - Computers/Networking - General - Programming - Systems Analysis & Design - Networking - COMPUTERS - General - Internet - Security - Computer networks, security measures - Computer science - Professional, career & trade -> computer science -> computer science - Professional, career & trade -> computer science -> security
Edition Identifiers:
- The Open Library ID: OL24601612M - OL8778520M
- Online Computer Library Center (OCLC) ID: 878966386
- All ISBNs: 1928994709 - 9781928994701
Author's Alternative Names:
"Ido Dubrawski"Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Hack Proofing Your Network at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39CCSP
By Wade Edwards, Tom Lancaster, Eric Quinn, Jason Rohm, Bryant Tow, Wade Edwards and Tom Lancaster

“CCSP” Metadata:
- Title: CCSP
- Authors: ➤ Wade EdwardsTom LancasterEric QuinnJason RohmBryant TowWade Edwards Tom Lancaster
- Language: English
- Number of Pages: Median: 655
- Publisher: SYBEX - Sybex
- Publish Date: 2003 - 2004
- Publish Location: San Francisco, Calif
“CCSP” Subjects and Themes:
- Subjects: ➤ Extranets (Computer networks) - Certification - Study guides - Examinations - Firewalls (Computer security) - Electronic data processing personnel - Network security - Study Aids - Networking - General - Computer Books: Operating Systems - Computer Data Security - Data Transmission Standards And Protocols - Security - General - Computers - Computers - Communications / Networking - Certification Guides - Cisco - Computers / Technical Skills - Networking - Network Protocols - Tests - Computer security - Extranets (computer networks) - Electronic data processing personnel, certification
Edition Identifiers:
- The Open Library ID: OL17920755M - OL8096636M
- Library of Congress Control Number (LCCN): 2003109126
- All ISBNs: 9780782142877 - 0782142877
First Setence:
"This chapter begins our detailed look at Cisco's firewall solutions, laying the groundwork for all the information you need to know for the Cisco Secure PIX Firewall Advanced (CSPFA) exam."
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find CCSP at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
40Security and Embedded Systems: Volume 2 NATO Security through Science Series

“Security and Embedded Systems: Volume 2 NATO Security through Science Series” Metadata:
- Title: ➤ Security and Embedded Systems: Volume 2 NATO Security through Science Series
- Language: English
- Number of Pages: Median: 216
- Publisher: IOS Press
- Publish Date: 2006
“Security and Embedded Systems: Volume 2 NATO Security through Science Series” Subjects and Themes:
- Subjects: Network security - Science/Mathematics - Science - General
Edition Identifiers:
- The Open Library ID: OL8819613M
- All ISBNs: 9781586035808 - 1586035800
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security and Embedded Systems: Volume 2 NATO Security through Science Series at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
41Cyber security
By Victor M. Christiansenn

“Cyber security” Metadata:
- Title: Cyber security
- Author: Victor M. Christiansenn
- Publisher: DCCI
- Publish Date: 2021
“Cyber security” Subjects and Themes:
- Subjects: ➤ cyber security - hacking - vulnerability scanning - penetration testing - Wi-Fi security - data protection - network security - encryption - firewalls
- Time: 21st century - modern cybersecurity
Edition Identifiers:
- The Open Library ID: OL59643179M
- All ISBNs: 8799759179 - 9788799759170
Access and General Info:
- First Year Published: 2021
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cyber security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
42Using NIST for Security and Risk Assessment
By Thomas P. Dover

“Using NIST for Security and Risk Assessment” Metadata:
- Title: ➤ Using NIST for Security and Risk Assessment
- Author: Thomas P. Dover
- Language: English
- Publisher: BC3 Pressbooks - Pressbooks
- Publish Date: 2022
“Using NIST for Security and Risk Assessment” Subjects and Themes:
- Subjects: ➤ Computer security - Risk assessment - Information technology industries - Network security
Edition Identifiers:
- The Open Library ID: OL37937998M
Access and General Info:
- First Year Published: 2022
- Is Full Text Available: Yes
- Is The Book Public: Yes
- Access Status: Public
Online Access
Online Borrowing:
Online Marketplaces
Find Using NIST for Security and Risk Assessment at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.