Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "Computers / Networking / Security / Bisacsh"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Showing
21
-
40
of
304
Search:
'"Computers / Networking / Security / Bisacsh"'
,
query time: 0.02s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
21
Web application vulnerabilities : detect, exploit, prevent
by
Cross, Michael
Published 2007
Syngress Pub.
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.76.A65
Read Now
22
Information system audit : how to control the digital disruption
by
Peret, Philippe
Published 2023
CRC Press
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
HD30.2
Read Now
23
The web application hacker's handbook : discovering and exploiting security flaws
by
Stuttard, Dafydd
Published 2008
Wiley Pub.
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.875.I57
Read Now
24
Applied network security monitoring : collection, detection, and analysis
by
Sanders, Chris
Published 2013
Syngress
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
25
Configuring SonicWALL firewalls
by
Lathem, Chris
Published 2006
Syngress
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
26
Cisco security specialist's guide to PIX firewalls
by
Osipav, Vitaly
Published 2002
Syngress Pub.
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
27
No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing
by
Long, Johnny
Published 2008
Syngress
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
28
Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices
by
Steadman, David
Published 2016
Packt Publishing
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
29
Writing secure code : practical strategies and proven techniques for building secure applications in a networked world
by
Howard, Michael
Published 2003
Microsoft Press
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
30
Security log management : identifying patterns in the chaos
by
Babbin, Jacob
Published 2006
Syngress
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
31
Security+ fast pass
by
Stewart, James Michael
Published 2004
SYBEX
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
32
Network security : know it all
by
Joshi, James B. D.
Published 2008
Morgan Kaufmann/Elsevier
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
33
Information security risk management for ISO27001/ISO27002
by
Calder, Alan
Published 2010
IT Governance Pub.
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
34
Gray hat hacking : the ethical hacker's handbook
by
Harper, Allen
Published 2011
McGraw-Hill
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
35
Assessing network security
by
Lam, Kevin
Published 2004
Microsoft Press
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
36
Application Security in the ISO27001 Environment
by
Vasudevan, Vinod
Published 2008
IT Governance Pub.
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
37
Cloud security : a comprehensive guide to secure cloud computing
by
Krutz, Ronald L.
Published 2010
Wiley Pub.
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.88813
Read Now
38
AAA and network security for mobile access : radius, diameter, EAP, PKI and IP mobility
by
Nakhjiri, Madjid
Published 2005
John Wiley & Sons
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5103.4885
Read Now
39
Absolute beginner's guide to personal firewalls
by
Ford, Jerry Lee
Published 2002
Que
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
40
Penetration tester's open source toolkit
by
Faircloth, Jeremy
Published 2011
Syngress
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
1
2
3
4
5
6
7
8
9
10
11
Back
Narrow Search
Year of Publication
From:
To:
Classification
331 - Labor economics
299
005 - Computer programming, programs & data
293
384 - Communications; telecommunication
35
658 - General management
32
500 - Natural sciences & mathematics
24
364 - Criminology
23
more ...
374 - Adult education
19
620 - Engineering & allied operations
17
330 - Economics
13
338 - Production
6
381 - Commerce
3
745 - Decorative arts
3
004 - Data processing & computer science
2
006 - Special computer methods
2
001 - Knowledge
1
153 - Mental processes & intelligence
1
158 - Applied psychology
1
302 - Social interaction
1
363 - Other social problems & services
1
368 - Insurance
1
657 - Accounting
1
see all ...
less ...
Language
English
303
Polish
1
Collection
O'Reilly
299
Elsevier ScienceDirect eBooks
5
Author
Gregg, Michael
6
Andress, Jason
5
Vacca, John R.
5
Beaver, Kevin
4
Cherry, Denny
4
Cross, Michael
4
more ...
Diogenes, Yuri
4
Dalziel, Henry
3
Dulaney, Emmett A.
3
Howard, Michael
3
LeBlanc, David
3
Mitnick, Kevin
3
Orebaugh, Angela
3
Shinder, Thomas W.
3
Taylor, Andy
3
Viega, John
3
Alazab, Mamoun
2
Alexander, David
2
Babbin, Jacob
2
Baskin, Brian
2
Bidgoli, Hossein
2
Bindner, Andrew
2
Bowen, Richard Cooper
2
Broad, James
2
Calder, Alan
2
Coar, Ken A. L.
2
Dubrawsky, Ido
2
Finch, Amanda
2
Furnell, Steven
2
Hoffman, Daniel
2
Hurley, Chris
2
Kissell, Joe
2
Koziol, Jack
2
Krausz, Michael
2
Krutz, Ronald L.
2
LaRock, Thomas
2
Litchfield, David
2
Liu, Dale
2
Liu, Vincent
2
Martin, Jason L.
2
McPherson, Robert
2
Middleton, Bruce
2
Miyamoto, I
2
Peikari, Cyrus
2
Pinto, Marcus
2
Ramirez, Gilbert
2
Rogers, Russ
2
Scambray, Joel
2
Seitz, Justin
2
Shinder, Debra Littlejohn
2
Simon, William L.
2
Stuttard, Dafydd
2
Sutton, David
2
Tiller, James S.
2
Varsalone, Jesse
2
Watkins, Stephen
2
Wilhelm, Thomas
2
Zalewski, Michal
2
Abu-Nimeh, Saeed
1
Adamson, James K.
1
Ahmad, David R. Mirza
1
Ahmed, Mohiuddin
1
Akhgar, Babak
1
Akin, Thomas
1
Ali, Shakeel
1
Alpern, Naomi J.
1
Alvarado, Ellen
1
Amiri, Iraj Sadegh
1
Anderson, Brian
1
Anley, Chris
1
Anoop, Mangla
1
Ansari, Juned Ahmed
1
Anzaldua, Reynaldo
1
Arabnia, Hamid
1
Archibald, Neil
1
Ashbourn, Julian
1
Ashok, Alaknanda
1
Baccas, Paul
1
Bachaalany, Elias
1
Bahadur, Gary
1
Baker, Andrew R.
1
Balas, Valentina Emilia
1
Barker, William
1
Barnett, Ryan C.
1
Barrett, Daniel J.
1
Barrett, Diane
1
Bauer, Michael D.
1
Bauhaus, Mark
1
Bayuk, Jennifer L.
1
Beale, Jay
1
Ben-Natan, Ron
1
Benton, K. David
1
Bergman, Neil
1
Bertocci, Vittorio
1
Bhardwaj, Anuj
1
Biles, Simon
1
Blackley, John A.
1
Blount, Sumner
1
Bond, Michael
1
Bonnell, Ralph
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?page=2&lookfor=%22Computers+%2F+Networking+%2F+Security+%2F+Bisacsh%22&type=Subject
Send by Email
×
Loading...