Your search returned 59 results.

Sort
Results
1.
Threat modeling : designing for security / Adam Shostack. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, 2014
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 SH.T 2014.

2.
Mapping security : the corporate security sourcebook for today's global economy / Tom Patterson with Scott Gleeson Blue. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Upper Saddle River, NJ : Addison-Wesley, 2005
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 658.478 PA.M 2005 G.C.

3.
Gray hat hacking : the ethical hacker's handbook / Dr. Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris. by
Edition: Fifth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York : McGraw-Hill Education, [2018]
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 / HA.C 2018.

4.
Hands-on ethical hacking and network defense / Michael T. Simpson, Nicholas Antill. by
Edition: Third edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Australia ; Boston, MA : Cengage Learning, 2017
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 SI.H 2017, ...

5.
Network security essentials : applications and standards / William Stallings. by
Edition: Sixth edition, Global edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Pearson, 2017
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 ST.N 2014.

6.
Invasion of privacy : big brother and the company hackers / Michael J. Weber by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Premier Press, 2004
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 323.4483 WE.I 2004 G.C.

7.
Beginning cryptography with Java / David Hook. by Series: Programmer to programmer
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley Publishing, 2005
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 HO.B 2005 G.C.

8.
Crimeware : understanding new attacks and defenses / Markus Jakobsson, Zulfikar Ramzan. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Upper Saddle River, NJ : Addison-Wesley, 2008
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 JA.C 2008 G.C.

9.
CompTIA security+ study guide / Emmett Dulaney. by Series:
Edition: Fourth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, Ind. : Wiley, 2009
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 DU.C 2009 G.C.

10.
International handbook of computer security / Jae K. Shim. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: London : Global Professional Publishing, 2008
Other title:
  • Computer security
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 SH.C 2008 G.C.

11.
Digital forensics with Kali Linux : perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x / Shiva V. N. Parasram. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Birmingham, UK : Packt Publishing, 2020
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 PA.D 2020, ...

12.
The hacker playbook 3 : Practical guide to penetration testing / Peter Kim. by
Edition: First edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: [place of publication not identified] : Secure Planet LLC, 2018
Availability: Items available for loan: The Knowledge Hub Library (3)Call number: 005.8 KI.T 2018, ...
Lists:

13.
Mastering python for networking and security : leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues / José Manuel Ortega. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Birmingham : Packt Publishing, 2020
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 OR.M 2020, ...

14.
Cryptography engineering : design principles and practical applications / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley Publishing, Inc, 2010
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.824 FE.C 2010.

15.
Black hat Python : Python programming for hackers and pentesters / by Justin Seitz. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: San Francisco : No Starch Press, 2015
Other title:
  • Python programming for hackers and pentesters
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 SE.B 2015.

16.
Real digital forensics : computer security and incident response / Keith J. Jones, Richard Bejtlich, Curtis W. Rose. by
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Specialized;
Publisher: Upper Saddle River, NJ : Addison-Wesley, 2006
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 JO.R 2006 G.C.

17.
Learning Metasploit Exploitation and Development / Balapure, Aditya. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Birmingham, England : Packt Publishing, 2013
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (1)Call number: 005.8 BA.L 2013.

18.
Guide to vulnerability analysis for computer networks and systems : an artifical intelligence approach / Simon Parkinson, Andrew Crampton, Richard Hill, editors. by Series: Computer communications and networks
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Cham, Switzerland : Springer Berlin Heidelberg, 2018
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 PA.G 2018.

19.
Hacking : the art of exploitation / Jon Erickson. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: California : William Pollock, 2008
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 / ER.H 2008, ...

20.
Cryptography and network security : principles and practice / William Stallings. by
Edition: Seventh edition, Global edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Pearson, 2017
Online resources:
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (1)Call number: 005.82 ST.C 2017.

Pages