Your search returned 62 results.

Sort
Results
Tivoli Public Key Infrastructure release notes : Version 3 Release 7.1 by
Material type: Text Text; Literary form: Not fiction
Publication details: [S.l.] : [S.n.], 2001
Availability: Items available for loan: Biblioteca de la Facultad de Informática (1)Call number: H.4.1.TIV PUB .

Tivoli Risk Manager release notes : Version 3 Release 8 by
Material type: Text Text; Literary form: Not fiction
Publication details: [S.l.] : [S.n.], 2001
Availability: Items available for loan: Biblioteca de la Facultad de Informática (1)Call number: H.4.1.TIV RIS .

Tivoli Risk Manager developer`s guide : Version 3 Release 8 by
Material type: Text Text; Literary form: Not fiction
Publication details: [S.l.] : [S.n.], 2001
Availability: Items available for loan: Biblioteca de la Facultad de Informática (1)Call number: H.4.1.TIV RIS .

Network segurity : how to plan for it and archive it by
Material type: Text Text; Literary form: Not fiction
Publication details: Nueva York : [S.n.], c1995
Availability: Items available for loan: Biblioteca de la Facultad de Informática (1)Call number: C.2.0 BAK.

Database security by Series: ACM Press Books
Edition: [1st ed.], repr.
Material type: Text Text; Literary form: Not fiction
Publication details: Wokingham : [S.n.], 1995
Availability: Items available for loan: Biblioteca de la Facultad de Informática (1)Call number: H.2 CAS .

Implementing Internet security by
Material type: Text Text; Literary form: Not fiction
Publication details: Indianapolis : [S.n.], c1995
Availability: Items available for loan: Biblioteca de la Facultad de Informática (1)Call number: C.2.0 IMP.

Internet security for business by
Material type: Text Text; Literary form: Not fiction
Publication details: Nueva York : [S.n.], c1996
Availability: Items available for loan: Biblioteca de la Facultad de Informática (1)Call number: C.2.0 INT.

Internet security : professional reference by
Edition: 2nd ed.
Material type: Text Text; Literary form: Not fiction
Publication details: Indianapolis : [S.n.], c1997
Availability: Items available for loan: Biblioteca de la Facultad de Informática (1)Call number: C.2.0 INT .

Internet security : risk analysis, strategies and firewalls by
Edition: 1st ed.
Material type: Text Text; Literary form: Not fiction
Publication details: London : International Thompsom Computer Press, c1997
Availability: Items available for loan: Biblioteca de la Facultad de Informática (1)Call number: C.2.0 KYA .

Distributed systems by Series: ACM Press Books
Edition: 2nd ed., repr.
Material type: Text Text; Literary form: Not fiction
Publication details: Nueva York : ACM Press ; Addison Wesley, 1994
Availability: Items available for loan: Biblioteca de la Facultad de Informática (1)Call number: C.2.4 MUL .

Cryptography and network security : principles and practice by
Edition: 3rd ed.
Material type: Text Text; Literary form: Not fiction
Publication details: Upper Saddle River : Prentice Hall, c2003
Availability: Items available for loan: Biblioteca de la Facultad de Informática (1)Call number: C.2.0 STA.

Internet security secrets by
Material type: Text Text; Literary form: Not fiction
Publication details: Foster City : [S.n.], c1996
Availability: Items available for loan: Biblioteca de la Facultad de Informática (1)Call number: C.2.0 VAC .

Procesamiento de transacciones sobre una base de datos by
Material type: Text Text; Literary form: Not fiction
Publication details: 1998
Dissertation note: Tesina (Licenciatura en Informática) - Universidad Nacional de La Plata. Facultad de Ciencias Exactas, 1998.
Availability: Items available for reference: Biblioteca de la Facultad de Informática: Consulta en Sala (1)Call number: TES 98/05 .

Microsoft Windows 2000 security technical reference by
Material type: Text Text; Literary form: Not fiction
Publication details: Redmond : [S.n.], 2000
Availability: Items available for loan: Biblioteca de la Facultad de Informática (1)Call number: D.4.WIN MIC .

Inside network perimeter security : the definitive guide to firewalls, VPNs, routers, and intrusion detection systems by
Edition: 1st ed.
Material type: Text Text; Literary form: Not fiction
Publication details: Boston : New Riders, 2003
Availability: Items available for loan: Biblioteca de la Facultad de Informática (1)Call number: C.2.0 INS.

MCSE: implementing and supporting Microsoft Proxy Server 2.0 by Series: Prentice Hall series on Microsoft technologies
Material type: Text Text; Literary form: Not fiction
Publication details: Upper Saddle River : [S.n.], 1999
Availability: Items available for loan: Biblioteca de la Facultad de Informática (1)Call number: C.2.0 RYV .

Nessus, Snort & Ethereal power tools : Customizing open source security applications by Series: Jay Beale's open source security series
Material type: Text Text; Literary form: Not fiction
Publication details: Rockland : [S.n.], c2005
Availability: Items available for loan: Biblioteca de la Facultad de Informática (1)Call number: C.2.0 ARC.

Penetration tester's open source toolkit by
Material type: Text Text; Literary form: Not fiction
Publication details: Rockland : [S.n.], c2006
Availability: Items available for loan: Biblioteca de la Facultad de Informática (2)Call number: C.2.0 LON , ... Not available: Biblioteca de la Facultad de Informática: No corresponde (1).

Snort 2.1 intrusion detection by Series: Jay Beale’s open source security series
Edition: 2nd ed.
Material type: Text Text; Literary form: Not fiction
Publication details: Rockland : [S.n.], c2004
Availability: Items available for loan: Biblioteca de la Facultad de Informática (1)Call number: C.2.0 BAK .

Nessus network auditing by Series: Jay Beale's open source security series
Material type: Text Text; Literary form: Not fiction
Publication details: Rockland : [S.n.], c2004
Availability: Items available for loan: Biblioteca de la Facultad de Informática (1)Call number: C.2.0 DER. Not available: Biblioteca de la Facultad de Informática: No corresponde (1).

Pages