Classify

An experimental classification web service

Powered by the Classify Web Service.

Search Results

Search Criteria: FAST heading = Computer security--Computer programs
Displaying 1 to 25 of 62
Title & Author Format Holdings Editions From To
The best damn firewall book period by Shinder, Thomas W.
DDC/LCC
  2911 25 2003 2007
Configuring Check Point NGX VPN-1/fire wall-1 by Stephens, Robert (Information security consultant)
DDC/LCC
  2270 23 2005 2009
Check Point NG VPN-1/Firewall-1 : advanced configuration and troubleshooting by Noble, Jim
DDC/LCC
  2123 16 2003 2003
Check Point FireWall-1 : administration guide by Goncalves, Marcus
DDC/LCC
  886 10 1999 2000
Guide to computer forensics and investigations by Nelson, Bill (Computer forensics examiner)
DDC/LCC
  808 61 2003 2021
Protecting games : a security handbook for game developers and publishers by Davis, Steven B
DDC/LCC
  723 14 2008 2014
Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography by Dube, Roger
DDC/LCC
  549 12 2008 2008
Reverse engineering code with IDA Pro by Pearce, Walter
DDC/LCC
  530 14 2008 2008
Check Point VPN-1/FireWall-1 NG administration by Shah, Inti
DDC/LCC
  466 6 2002 2003
Beginning security with Microsoft technologies : protecting Office 365, devices, and data by Lakshmi, Vasantha
DDC/LCC
  431 6 2019 2019
Check Point Next Generation with application intelligence security administration by Tobkin, Chris
DDC/LCC
  342 10 2003 2004
Detect, protect, dis-infect : consumers online face wide choices in security products by United States.
DDC
  334 2 2004 2004
Essential Check Point FireWall-1 NG : an installation, configuration, and troubleshooting guide by Welch-Abernathy, Dameon D.
DDC/LCC
  300 8 2004 2004
The Ghidra book : the definitive guide by Eagle, Chris
DDC/LCC
  286 9 2020 2020
Hyper-V Security by Siron, Eric
DDC/LCC
  246 8 2014 2014
Key management deployment guide : using the IBM Enterprise key management foundation by Mike Andreasen. Carsten Dahl Frehr. W. Craig Johnston. Alina Mot. Troels Norgaard. Soren Peen. Per Snowman. Axel Buecker
LCC
  217 4 2014 2014
Hacking interdit by Gomez Urbina, Alexandre
DDC/LCC
  217 20 2006 2021
Kali Linux web app testing by Jack, Linkcabin
LCC
  172 2 2015 2015
Practical AI for cybersecurity by Das, Ravindra
DDC/LCC
  144 5 2021 2021
Essential Check Point FireWall-1 : an installation, configuration, and troubleshooting guide by Welch-Abernathy, Dameon D.
DDC/LCC
  98 5 2001 2002
Check Point NG/AI : Next Generation with Application Intelligence Security Administration by Tobkin, Chris
DDC/LCC
  56 3 2004 2004
Stepping through the InfoSec program by Bayuk, Jennifer L.
DDC/LCC
  55 4 2007 2007
Managing and deploying Check Point InterSpect
DDC/LCC
  53 2 2004 2004
Managing and deploying ClusterXL
DDC/LCC
  52 2 2004 2004
Securite reseaux by Stang, David J.
DDC
  45 4 1996 1996
Displaying 1 to 25 of 62
.