1. Digital cash : commerce on the Net

by Wayner, Peter.

Publisher: Boston : AP Professional, c1996Availability: Copies available for loan: [HG1710 .W39 1996] (1). Actions: Place hold
2. Maximum security : a hacker's guide to protecting your Internet site and network

Edition: 1st ed.Publisher: Indianapolis, Ind. : Sams.net, c1997Availability: Copies available for loan: [QA76.9 .A25 M39 1997] (1). Actions: Place hold
3. Firewalls complete [computer file]

by Gonçalves, Marcus. -- NetLibrary, Inc

Publisher: New York : McGraw-Hill, c1998Online Access: Bibliographic record display An electronic book accessible through the World Wide Web; click for information Availability: Copies available for loan: [TK5105.59 .G65 1999] (1). Actions: Place hold
4. Protecting networks with SATAN [computer file]

by Freiss, Martin. -- NetLibrary, Inc

Edition: 1st English ed.Publisher: Sebastopol, CA : O'Reilly, 1998Other title: Internet security for system administrators.Online Access: Bibliographic record display An electronic book accessible through the World Wide Web; click for information Availability: Copies available for loan: [TK5105.59 .F74 1998] (1). Actions: Place hold
5. SSH, the secure shell : the definitive guide

by Barrett, Daniel J; Silverman, Richard E.

Edition: 1st ed.Publisher: Beijing ; Cambridge [Mass.] : O'Reilly, 2001Availability: Copies available for loan: [QA76.76 .O63 B369 2001] (2). Actions: Place hold
6. Web security basics [electronic resource]

by Bhasin, Shweta. -- NIIT (Corporation); NetLibrary, Inc

Publisher: Cincinnati, Ohio : Premier Press, c2003Online Access: Bibliographic record display An electronic book accessible through the World Wide Web; click for information Availability: Copies available for loan: [TK5105.59 .B47 2003 EB] (1). Actions: Place hold
7. Special ops host and network security for Microsoft, UNIX, and Oracle / [electronic resource]

by Birkholz, Erik Pace; McClure, Stuart. -- NetLibrary, Inc

Publisher: Rockland, Mass. : Syngress Pub., c2003Online Access: Bibliographic record display An electronic book accessible through the World Wide Web; click for information Availability: Copies available for loan: [TK5105.59 .B57 2003 EB] (1). Actions: Place hold
8. Cisco security [electronic resource]

by Bhatnagar, Kartik. -- NIIT (Corporation); NetLibrary, Inc

Publisher: Cincinnati, Ohio : Premier Press, c2002Online Access: Bibliographic record display An electronic book accessible through the World Wide Web; click for information Availability: Copies available for loan: [TK5105.59 .B43 2002 EB] (1). Actions: Place hold
9. Innocent code : a security wake-up call for Web programmers

by Huseby, Sverre H.

Publisher: New York : John Wiley & Sons, c2004Availability: Copies available for loan: [QA76.9 .A25 H88 2004] (1). Actions: Place hold
10. Apache security

by Ristic, Ivan.

Edition: 1st ed.Publisher: Sebastopol, CA : O'Reilly Media, 2005Availability: Copies available for loan: [TK5105.8885 .A63 R57 2005] (1). Actions: Place hold
11. Network security using LINUX

by Sweeney, Michael.

Edition: 1st ed.Publisher: Orange, Calif. : Packet Press, 2005Availability: Copies available for loan: [TK5105.59 .S94 2005] (1). Actions: Place hold
No cover image available
12. SSH, the secure shell : the definitive guide

by Barrett, Daniel J; Silverman, Richard E; Byrnes, Robert G.

Edition: 2nd ed.Publisher: Sebastopol, CA : O'Reilly, c2005Availability: Copies available for loan: [QA76.76 .O63 B369 2005] (1). Actions: Place hold
13. Developer's guide to web application security

by Cross, Michael.

Publisher: Rockland, MA : Syngress Publishing, c2007Availability: Copies available for loan: [TK5105.59 .C767 2007] (1). Actions: Place hold
14. How to cheat at securing Linux

by Krishnamurthy, Mohan.

Publisher: Burlington, MA : Syngress, c2008Availability: Copies available for loan: [TK5105.59 .H683 2008] (1). Actions: Place hold
15. Unix, Solaris and Linux : a practical security cookbook : securing UNIX operating system without third-party applications

by Loza, Boris.

Publisher: Bloomington, IN : AuthorHouse, c2004Availability: Copies available for loan: [QA76.9 .A25 L69 2004] (1). Actions: Place hold
16. Kerberos : the definitive guide

by Garman, Jason.

Edition: 1st ed.Publisher: Beijing ; Farnham : O'Reilly, 2003Availability: Copies available for loan: [TK5105.59 .G375 2003] (1). Actions: Place hold
17. Sudo mastery : user access control for real people

by Lucas, Michael.

Publisher: [United States] : Tilted Windmill Press, c2013Availability: Copies available for loan: [TK5105.59 .S83 2013] (1). Actions: Place hold
18. SSH mastery : OpenSSH, PuTTY, Tunnels and Keys

by Lucas, Michael.

Publisher: [United States] : Tilted Windmill Press, c2011Availability: Copies available for loan: [TK5102.59 .L835 2012] (1). Actions: Place hold

Any questions? Ask a Librarian.

Not finding what you are looking for? Request-It - InterLibrary Loan.

Languages: