Your search returned 24 results.

Sort
Results
1.
Guide to vulnerability analysis for computer networks and systems : an artifical intelligence approach / Simon Parkinson, Andrew Crampton, Richard Hill, editors. by Series: Computer communications and networks
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Cham, Switzerland : Springer Berlin Heidelberg, 2018
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 PA.G 2018.

2.
Hacking : the art of exploitation / Jon Erickson. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: California : William Pollock, 2008
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 / ER.H 2008, ...

3.
Data and computer communications / William Stallings ; with contributions by Moumita Mitra Manna. by
Edition: Tenth edition, International edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Pearson, 2014
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 004.6 ST.D 2014.

4.
Cryptography and network security : principles and practice / William Stallings. by
Edition: Seventh edition, Global edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Pearson, 2017
Online resources:
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (1)Call number: 005.82 ST.C 2017.

5.
Serious cryptography : a practical introduction to modern encryption / Jean-Philippe Aumasson ; foreword by Matthew D. Green. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: San Francisco : No Starch Press, 2018
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.824 AU.S 2018.

6.
Computer networks and internets / Douglas E. Comer. by Series: Always learning
Edition: Sixth edition, Global edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Pearson, 2015
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (3)Call number: 004.6 CO.C 2015, ...

7.
Computer networking : a top-down approach / James F. Kurose, Keith W. Ross. by
Edition: Seventh edition, Global edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Pearson, 2017
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 004.678 KU.C 2017.

8.
Computer networks : Andrew S. Tanenbaum, David J. Wetherall. by
Edition: Fifth edition, international edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Boston : Pearson, 2011
Availability: Items available for loan: The Knowledge Hub Library (10)Call number: 004.6 TA.C 2014, ...
Lists:

9.
Threat modeling : designing for security / Adam Shostack. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, 2014
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 SH.T 2014.

10.
Hands-on ethical hacking and network defense / Michael T. Simpson, Nicholas Antill. by
Edition: Third edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Australia ; Boston, MA : Cengage Learning, 2017
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 SI.H 2017, ...

11.
Networking : a beginner's guide / Bruce Hallberg. by
Edition: Sixth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York : McGraw-Hill Education, 2014
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 004.6 HA.N 2014.

12.
Network security essentials : applications and standards / William Stallings. by
Edition: Sixth edition, Global edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Pearson, 2017
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 ST.N 2014.

13.
Cyber security management : a governance, risk and compliance framework / Peter Trim, Yang-Im Lee. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Oxon, England : Routledge, 2016
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (1)Call number: 658.478 TR.C 2016.

14.
Web security : a WhiteHat perspective / Hanqing Wu and Liz Zhao. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boca Raton, FL : CRC Press is an imprint of Taylor & Francis, 2015Publisher: Beijing, China : Publishing House of Electronics Industry, 2015
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 WU.W 2015, ...

15.
Digital forensics with Kali Linux : perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x / Shiva V. N. Parasram. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Birmingham, UK : Packt Publishing, 2020
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 PA.D 2020, ...

16.
The hacker playbook 3 : Practical guide to penetration testing / Peter Kim. by
Edition: First edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: [place of publication not identified] : Secure Planet LLC, 2018
Availability: Items available for loan: The Knowledge Hub Library (3)Call number: 005.8 KI.T 2018, ...
Lists:

17.
Mastering Python networking : your one-stop solution to using Python for network automation, programmability, and DevOps / Eric Chou ; foreword by Michael Kennedy. by
Edition: Third edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Birmingham : Packt Publishing, 2020
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.133 CH.M 2020, ...

18.
Mastering python for networking and security : leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues / José Manuel Ortega. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Birmingham : Packt Publishing, 2020
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 OR.M 2020, ...

19.
Practical web penetration testing : secure web applications using Burp Suite, Nmap, Metasploit, and more / Gus Khawaja. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Birmingham, UK : Packt Publishing, 2018
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.758 KH.P 2018, ...
Lists:

20.
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : John Wiley & Sons, Inc., 2014
Other title:
  • Detecting malware and threats in Windows, Linux, and Mac memory
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 004.50285/58 LI.A 2014. Not available: The Knowledge Hub Library : Checked out (1).

Pages