Search Results - Syngress
Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 31
- Computer networks 27
- Computer security 27
- Computer crimes 14
- Investigation 11
- Access control 5
- Computer hackers 5
- Internet 5
- Application software 4
- Penetration testing (Computer security) 4
- Client/server computing 3
- Cloud computing 3
- Computers 3
- Data protection 3
- Information resources management 3
- Internet programming 3
- Prevention 3
- Testing 3
- Virtual computer systems 3
- Web site development 3
- Web sites 3
- Wireless communication systems 3
- Augmented reality 2
- Data recovery (Computer science) 2
- Design 2
- Development 2
- Electronic commerce 2
- Electronic discovery (Law) 2
- Forensic sciences 2
- Information technology 2
-
41
Hack proofing your web applications
Published 2001“…Syngress Pub.…”
Click Here to View Status and Holdings.
Unknown -
42
Designing a wireless network
Published 2002“…Syngress Pub.…”
Click Here to View Status and Holdings.
Unknown -
43
Designing SQL server 2000 databases for .net enterprise servers
Published 2001“…Syngress Pub.…”
Click Here to View Status and Holdings.
Unknown -
44
Mission critical! internet security
Published 2001“…Syngress Pub…”
Click Here to View Status and Holdings.
Unknown -
45
E-mail virus protection handbook
Published 2000“…Syngress Pub…”
Click Here to View Status and Holdings.
Unknown -
46
Security sage's guide to hardening the network infrastucture
Published 2004“…Syngress Pub.…”
Click Here to View Status and Holdings.
Unknown -
47
Physical and logical security convergence powered by enterprise security management
Published 2007“…Syngress Publishing…”
Click Here to View Status and Holdings.
Unknown -
48
Developer's guide to web application security
Published 2007“…Syngress Publishing…”
Click Here to View Status and Holdings.
Unknown -
49
The IT/digital legal companion a comprehensive business guide to software, Internet, and IP law : includes contracts and web forms
Published 2008“…Syngress/Elsevier…”
Click Here to View Status and Holdings.
Unknown -
50
Web application vunerabilities detect, exploit, prevent
Published 2007“…Syngress Publ.…”
Click Here to View Status and Holdings.
Unknown -
51
Infosecurity 2008 threat analysis
Published 2008“…Syngress Publishing…”
Click Here to View Status and Holdings.
Unknown -
52
Ninja hacking unconventional penetration testing tactics and techniques
Published 2011“…Syngress/Elsevier…”
Click Here to View Status and Holdings.
Unknown -
53
Network and system security
Published 2010“…Syngress/Elsevier…”
Click Here to View Status and Holdings.
Book Chapter -
54
Virtualization and forensics a digital forensic investigator's guide to virtual environments
Published 2010“…Syngress/Elsevier…”
Click Here to View Status and Holdings.
Unknown -
55
Seven deadliest wireless technologies attacks
Published 2010“…Syngress/Elsevier…”
Click Here to View Status and Holdings.
Unknown -
56
Web application obfuscation '-/WAFs..Evasion..Filters//alert (/Obfuscation/)-'
Published 2011“…Elsevier/Syngress…”
Click Here to View Status and Holdings.
Unknown -
57
iPhone and iOS forensics investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devices
Published 2011“…Syngress/Elsevier…”
Click Here to View Status and Holdings.
Unknown -
58
Cyber warfare techniques, tactics and tools for security practitioners
Published 2011“…Syngress/Elsevier…”
Click Here to View Status and Holdings.
Book -
59
Migrating to the cloud Oracle client/server modernization
Published 2012“…Elsevier/Syngress…”
Click Here to View Status and Holdings.
Book -
60
Practical lock picking a physical penetration tester's training guide
Published 2012“…Syngress/Elsevier…”
Click Here to View Status and Holdings.
Book