Your search returned 4 results.

Sort
Results
1.
Threat modeling : designing for security / Adam Shostack. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, 2014
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 SH.T 2014.

2.
Digital forensics with Kali Linux : perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x / Shiva V. N. Parasram. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Birmingham, UK : Packt Publishing, 2020
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 PA.D 2020, ...

3.
The hacker playbook 3 : Practical guide to penetration testing / Peter Kim. by
Edition: First edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: [place of publication not identified] : Secure Planet LLC, 2018
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 KI.T 2018. Not available: The Knowledge Hub Library : Checked out (2).
Lists:

4.
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : John Wiley & Sons, Inc., 2014
Other title:
  • Detecting malware and threats in Windows, Linux, and Mac memory
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 004.50285/58 LI.A 2014, ...

Pages