Your search returned 59 results.

Sort
Results
21.
Fundamentals of information systems security / David Kim, Michael G. Solomon. by
Edition: Fourth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Burlington, Massachusetts : Jones & Bartlett Learning, 2023
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 KI.F 2023. Items available for reference: The Knowledge Hub Library : Not For Loan (3)Call number: 005.8 KI.F 2023, ...

22.
Digital forensics with Kali Linux : perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x / Shiva V. N. Parasram. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Birmingham, UK : Packt Publishing, 2020
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 PA.D 2020, ...

23.
The hacker playbook 3 : Practical guide to penetration testing / Peter Kim. by
Edition: First edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: [place of publication not identified] : Secure Planet LLC, 2018
Availability: Items available for loan: The Knowledge Hub Library (3)Call number: 005.8 KI.T 2018, ...
Lists:

24.
Mastering python for networking and security : leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues / José Manuel Ortega. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Birmingham : Packt Publishing, 2020
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 OR.M 2020, ...

25.
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : John Wiley & Sons, Inc., 2014
Other title:
  • Detecting malware and threats in Windows, Linux, and Mac memory
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 004.50285/58 LI.A 2014, ...

26.
Understanding new security threats / edited by Michel Gueldry, Gigi Gokcek and Lui Hebron. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Abingdon, Oxon ; New York, NY : Routledge, 2019
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 355.033 MI.U 2019 G.C.

27.
Web security : a WhiteHat perspective / Hanqing Wu and Liz Zhao. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boca Raton, FL : CRC Press is an imprint of Taylor & Francis, 2015Publisher: Beijing, China : Publishing House of Electronics Industry, 2015
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 WU.W 2015, ...

28.
29.
Network security for dummies / by Chey Cobb. by Series: --For dummies | --For dummies
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley , 2003
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 CO.N 2003 G.C.

30.
Network access control for dummies / by Jay Kelley, Rich Campagna, Denzil Wessels. by Series: --For dummies
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Hoboken, N.J. : Wiley, 2009
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 KE.N 2009 G.C.

31.
Cryptography engineering : design principles and practical applications / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley Publishing, Inc, 2010
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.824 FE.C 2010.

32.
Digital forensics and investigations : people, processes, and technologies to defend the enterprise / Jason Sachowski. by
Material type: Text Text; Literary form: Not fiction
Publisher: Boca Raton, FL : CRC Press, Taylor and Francis Group, 2018
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (1)Call number: 363.25968 SA.D 2018.

33.
Black hat Python : Python programming for hackers and pentesters / by Justin Seitz. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: San Francisco : No Starch Press, 2015
Other title:
  • Python programming for hackers and pentesters
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 SE.B 2015.

34.
Learning Metasploit Exploitation and Development / Balapure, Aditya. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Birmingham, England : Packt Publishing, 2013
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (1)Call number: 005.8 BA.L 2013.

35.
Fundamentals of information systems security / David Kim, Michael G. Solomon. by Series: Jones & Bartlett Learning information systems security & assurance series
Edition: Third edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Burlington, MA : Jones & Bartlett Learning, 2018
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 KI.F 2018.

36.
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York : Wiley, 1996
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.82 SC.A 1996 G.C.

37.
Cryptography and network security : principles and practice / William Stallings. by
Edition: Seventh edition, Global edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Pearson, 2017
Online resources:
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (1)Call number: 005.82 ST.C 2017.

38.
Cyber security : law and guidance / Helen Wong. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: London : Bloomsbury Professional, 2018
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (8)Call number: 005.8 MB.C 2018, ...
Lists:

39.
Applied security visualization / Raffael Marty. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Upper Saddle River, NJ : Addison-Wesley, 2009
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 MA.A 2009 G.C.

40.
Security administrator street smarts : a real world guide to CompTIA Security+ skills / David R. Miller, Michael Gregg. by Series: Serious skills | Street smarts series
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis : Wiley , 2009
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 MI.S 2009 G.C.

Pages