It looks like you're offline.
Open Library logo
additional options menu
Last edited by MARC Bot
December 13, 2022 | History

Murugiah Souppaya

We need a photo of Murugiah Souppaya

10 works Add another?

Showing all works by author. Would you like to see only ebooks?

  • Cover of: Guidelines for Securing Wireless Local Area Networks (WLANS)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Guidance for securing Microsoft Windows XP Home Edition: a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Guidelines for securing wireless local area networks (WLANs) (draft): recommendations of the National Institute of Standards and Technology

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Guide to Computer Security Log Management : Recommendations of the National Institute of Standards and Technology: Special Publication 800-92

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Guide to enterprise patch management technologies (draft): recommendations of the National Institute of Standards and Technology

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Guidelines for managing and securing mobile devices in the enterprise (draft): recommendations of the National Institute of Standards and Technology

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: BIOS Protection Guidelines: Recommendations of the National Institute of Standards and Technology

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Guidelines for Securing Wireless Local Area Networks: Recommendations of the National Institute of Standards and Technology

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Technical Guide to Information Security Testing and Assessment: Recommendations of the National Institute of Standards and Technology

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Guide to Securing Microsoft Windows XP Systems for IT Professionals: a NIST Security Configuration Checklist

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today

History

Download catalog record: RDF / JSON
December 13, 2022 Created by MARC Bot import new book