This page contains enriched content visible when JavaScript is enabled.
My Account
Library Home
Your session will expire automatically in
0
seconds.
Continue session
End session now
Return to Browse
Limit/Sort Search
SearchType
Keyword
Title
Author (Last name first)
Subject
ISBN/ISSN
Call Number
Unit Code
Libraries Australia No.
Library of Congress No.
Search
Search Scope
Entire Collection
Print Books
E-books
All books
E-journals
All journals
Databases
All e-resources
Streaming Video
DVDs
Curriculum Resources
Deakin Theses
Special Collections
Melbourne Burwood
Warrnambool
Geelong Waterfront
Geelong Waurn Ponds
Limit search to available items
Add Marked to Bag
Add All On Page
Add Marked to My Lists
Subjects (1-15 of 15)
Computer security -- Computer programs
1
2022
Check Point Firewall Administration R81. 10+ : a Practical Guide to Check Point Firewall Deployment and Administration
Yakovlev, Vladimir
1st edition
Rating:
Electronic Resources
2
2003
Check Point NG VPN-1/Firewall-1 : advanced configuration and troubleshooting
Noble, Jim
Rating:
Electronic Resources
3
Configuring Check Point NGX VPN-1/Firewall-1
Stephens, Robert
Rating:
Electronic Resources
4
2005
Configuring Check Point NGX VPN-1/FireWall-1
Stephens, Robert (Information security consultant)
Rating:
Electronic Resources
More...
5
2016
Cyberwar: Cyber Mercenaries - Ep 6
Australia : SBS VICELAND, 2016
Rating:
6
2016
Cyberwar: Hacking The Infrastructure - Ep 2
Australia : SBS 2, 2016
Rating:
7
2016
Cyberwar: The Sony Hack - Ep 3
Australia : SBS 2, 2016
Rating:
8
2004
Essential Check Point FireWall-1 NG : an installation, configuration, and troubleshooting guide
Welch-Abernathy, Dameon D.
Boston : Addison-Wesley, 2004
Rating:
Request It
Location
Call no.
Vol.
Availability
W'PONDS
005.8 FireWa Wel/Ecp
AVAILABLE
MELB
005.8 FireWa Wel/Ecp
DUE 03-05-24
9
2004
Essential Check Point FireWall-1 NG : an installation, configuration, and troubleshooting guide
Welch-Abernathy, Dameon D
Rating:
Electronic Resources
10
2024
Evading EDR : sensors, telemetry, and how to bypass them
Hand, Matt, author
San Francisco, CA : No Starch Press, [2024]
Rating:
Electronic Resources
11
2020
The Ghidra book : the definitive guide
Eagle, Chris, author.
San Francisco : No Starch Press, [2020]
Rating:
Electronic Resources
12
2015
Guide to computer forensics and investigations
Nelson, Bill, author
Fifth edition
Boston, Massachusetts : Cengage Learning, [2015]
Rating:
Request It
Location
Call no.
Vol.
Availability
MELB
005.8 Nel/Gtc 2016
DUE 12-05-24
MELB
005.8 Nel/Gtc 2016
DUE 14-05-24
MELB
005.8 Nel/Gtc 2016
DUE 12-05-24
View additional copies of this item
13
2008
Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography
Dube, Roger.
Hoboken, N.J. : Wiley, [2008]
Rating:
14
2014
Key management deployment guide : using the IBM Enterprise key management foundation
Rating:
Electronic Resources
15
2022
Mobilizing the C-Suite Waging War Against Cyberattacks
Riccardi, Frank
Rating:
Electronic Resources
Add Marked to Bag
Add All On Page
Locate in results
Return to Browse
Limit/Sort Search