Results
|
1.
|
|
|
2.
|
Hacking : the art of exploitation / Jon Erickson. by
Edition: Second edition.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: California : William Pollock, 2008
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 / ER.H 2008, ...
|
|
3.
|
|
|
4.
|
|
|
5.
|
|
|
6.
|
|
|
7.
|
|
|
8.
|
Computer networks : Andrew S. Tanenbaum, David J. Wetherall. by
Edition: Fifth edition, international edition.
Material type: Text; Format:
print
; Literary form:
Not fiction
Boston : Pearson, 2011
Availability: Items available for loan: The Knowledge Hub Library (10)Call number: 004.6 TA.C 2014, ...
|
|
9.
|
|
|
10.
|
|
|
11.
|
Networking : a beginner's guide / Bruce Hallberg. by
Edition: Sixth edition.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: New York : McGraw-Hill Education, 2014
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 004.6 HA.N 2014.
|
|
12.
|
|
|
13.
|
|
|
14.
|
Web security : a WhiteHat perspective / Hanqing Wu and Liz Zhao. by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton, FL : CRC Press is an imprint of Taylor & Francis, 2015Publisher: Beijing, China : Publishing House of Electronics Industry, 2015
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 WU.W 2015, ...
|
|
15.
|
|
|
16.
|
The hacker playbook 3 : Practical guide to penetration testing / Peter Kim. by
Edition: First edition.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: [place of publication not identified] : Secure Planet LLC, 2018
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 KI.T 2018, ... Not available: The Knowledge Hub Library : Checked out (1).
|
|
17.
|
|
|
18.
|
|
|
19.
|
|
|
20.
|
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters. by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis, IN : John Wiley & Sons, Inc., 2014
Other title: - Detecting malware and threats in Windows, Linux, and Mac memory
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 004.50285/58 LI.A 2014, ...
|