Your search returned 59 results.

Sort
Results
41.
Securing PHP web applications / Tricia Ballad, William Ballad. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Upper Saddle River, NJ : Addison-Wesley, 2009
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 BA.S 2009 G.C.

42.
43.
Professional penetration testing / Thomas Wilhelm, Matthew Neely, technical editor. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Amsterdam : Syngress, an imprint of Elsevier, [2013
Online resources:
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (5)Call number: 005.8 WI.P 2013, ...
Lists:

44.
Cyber security management : a governance, risk and compliance framework / Peter Trim, Yang-Im Lee. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Burlington, VT : Gower, 2020
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (4)Call number: 005.8076 TR.C 2020, ...

45.
Metasploit : the penetration tester's guide / by David Kennedy [and others]. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: San Francisco : No Starch Press, 2011
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 KE.M 2011, ...

46.
Information security management principles / Andy Taylor ; David Alexander, Amanda Finch and David Sutton. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Swindon, UK : BCS, the Chartered Institute for IT, 2013
Online resources:
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (1)Call number: 658.478 TA.I 2013.
Lists:

47.
Cryptography for dummies / by Chey Cobb. by Series: --For dummies | --For dummies
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Hoboken, NJ : Wiley Pub., 2004
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 CO.C 2004 G.C.

48.
Comptia Security+ 2008 in depth / Mark Ciampa. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Course Technology, 2009
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 CI.C 2009 G.C.

49.
Cybersecurity data science projects for students : beginner projects to learn the field and build up your resume / Emmanuel Tsukerman. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: [place of publication not identified] : Independently published, 2020
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (5)Call number: 005.8 TS.C 2020, ...

50.
Practical mobile forensics : forensically investigate and analyze iOS, Android, and Windows 10 devices / Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty. by
Edition: Fourth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Birmingham, UK : Packt Publishing, 2020
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 TA.P 2020, ...

51.
Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart. by
Edition: Sixth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston, MA : Cengage, 2019
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 NE.G 2019, ...

52.
Reversing : secrets of reverse engineering / Eldad Eilam. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Indianapolis, IN : Wiley Publishing, Inc, 2005
Online resources:
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (5)Call number: 005.1 EI.R 2005, ...

53.
Introduction to modern cryptography / Jonathan Katz, Yehuda Lindell, by Series: Chapman & Hall/CRC cryptography and network security | Chapman & Hall/CRC cryptography and network security
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boca Raton : CRC Press, Taylor & Francis, 2015
Online resources:
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (1)Call number: 005.82 KA.I 2015.

54.
Computer security : art and science / Matt Bishop ; with contributions from Elisabeth Sullivan and Michelle Ruppel. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Addison-Wesley, 2019
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 / BI.C 2019.

55.
Computer security / Dieter Gollmann. by
Edition: Third edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Chichester, West Sussex : Wiley, 2011
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (10)Call number: 005.8 GO.C 2011, ... Not available: The Knowledge Hub Library : Checked out (1).

56.
Hacking with Kali : practical penetration testing techniques / James Broad, Andrew Bindner. by
Edition: First edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Amsterdam ; Boston : Syngress, an imprint of Elsevier, 2014
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 BR.H 2014. Items available for reference: The Knowledge Hub Library : Not For Loan (4)Call number: 005.8 BR.H 2014, ...
Lists:

57.
Introduction to modern cryptography / Jonathan Katz and Yehuda Lindell. by
Edition: Third edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boca Raton, Florida : Chapman & Hall / CRC Press, Taylor & Francis Group, 2021
Online resources:
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (4)Call number: 005.82 KA.I 2021, ...

58.
The Mobile application hacker's handbook / Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, 2015
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 / CH.M 2015.

59.
Ethics and cyber warfare : the quest for responsible security in the age of digital warfare / George Lucas. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York, NY : Oxford University Press, 2017
Availability: Items available for loan: The Knowledge Hub Library (6)Call number: 172.42 GE.E 2017, ... Items available for reference: The Knowledge Hub Library : Not For Loan (5)Call number: 172.42 GE.E 2017, ...

Pages