1. The security risk assessment handbook : a complete guide for performing security risk assessments /: a complete guide for performing security risk assessments. (2006) Other Names: Landoll, Douglas J Record Type: Book Extent: 1 online resource (xxi, 473 pages), illustrations, maps View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Audit and trace log management : consolidation and analysis /: consolidation and analysis. (2006) Other Names: Maier, Phillip Q Record Type: Book Extent: 1 online resource (xiii, 171 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Enhancing computer security with smart technology. (2006) Other Names: Vemuri, V. Rao Record Type: Book Extent: 1 online resource (xvii, 269 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Securing HP NonStop servers in an open systems world : TCP/IP, OSS, & SQL /: TCP/IP, OSS, & SQL. (©2006) Other Names: XYPRO Technology Corporation. Record Type: Book Extent: 1 online resource (lxviii, 932 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Information security architecture : an integrated approach to security in the organization /: an integrated approach to security in the organization. (2006) Other Names: Tudor, Jan Killmeyer Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. The CISO handbook : a practical guide to securing your company /: a practical guide to securing your company. (2006) Other Names: Gentile, Michael; Collette, Ronald D; August, Thomas D Record Type: Book Extent: 1 online resource (xxiii, 322 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Essential computer security : everyone's guide to e-mail, Internet, and wireless security /: everyone's guide to e-mail, Internet, and wireless security. (2006) Other Names: Bradley, Tony, 1969-; Carvey, Harlan A Record Type: Book Extent: 1 online resource (279 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Hack the stack : using snort and ethereal to master the 8 layers of an insecure network /: using snort and ethereal to master the 8 layers of an insecure network. (2006) Other Names: Gregg, Michael (Michael C.); (Information security professional), Watkins, Stephen Record Type: Book Extent: 1 online resource (481 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Designing and implementing Linux firewalls and QoS using netfilter, iproute2, NAT, and L7-filter : learn how to secure your system and implement QoS using real-world scenarios for networks of all sizes /: learn how to secure your system and implement QoS using real-world scenarios for networks of all sizes. (2006) Other Names: Gheorghe, Lucian Record Type: Book Extent: 1 online resource (288 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. How to cheat at Windows System Administration using command line scripts. (2006) Other Names: Bhardwaj, Pawan K; Andreou, Kimon; Barber, Brian; Kleiman, Dave; Satyanarayana, Mahesh Record Type: Book Extent: 1 online resource (400 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗