Results
|
21.
|
Applied security visualization / Raffael Marty. by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River, NJ : Addison-Wesley, 2009
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 MA.A 2009 G.C.
|
|
22.
|
CompTIA security+ : review guide / James Michael Stewart. by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis, Indiana : Wiley Publishing, 2009
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 ST.C 2009 G.C, ...
|
|
23.
|
|
|
24.
|
CompTIA security+ study guide / Emmett Dulaney. by Series:
Edition: Fourth edition.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis, Ind. : Wiley, 2009
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 DU.C 2009 G.C.
|
|
25.
|
|
|
26.
|
|
|
27.
|
|
|
28.
|
|
|
29.
|
Web security : a WhiteHat perspective / Hanqing Wu and Liz Zhao. by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton, FL : CRC Press is an imprint of Taylor & Francis, 2015Publisher: Beijing, China : Publishing House of Electronics Industry, 2015
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 WU.W 2015, ...
|
|
30.
|
|
|
31.
|
The hacker playbook 3 : Practical guide to penetration testing / Peter Kim. by
Edition: First edition.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: [place of publication not identified] : Secure Planet LLC, 2018
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 KI.T 2018. Not available: The Knowledge Hub Library : Checked out (2).
|
|
32.
|
|
|
33.
|
|
|
34.
|
|
|
35.
|
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters. by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis, IN : John Wiley & Sons, Inc., 2014
Other title: - Detecting malware and threats in Windows, Linux, and Mac memory
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 004.50285/58 LI.A 2014, ...
|
|
36.
|
|
|
37.
|
Being digital / Nicholas Negroponte. by
Edition: First Vintage books edition.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: New York : Vintage Books, 1996
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (2)Call number: 303.4833 NE.B 1996, ...
|
|
38.
|
|
|
39.
|
|
|
40.
|
Fundamentals of information systems security / David Kim, Michael G. Solomon. by
Edition: Fourth edition.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: Burlington, Massachusetts : Jones & Bartlett Learning, 2023
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 KI.F 2023. Items available for reference: The Knowledge Hub Library : Not For Loan (3)Call number: 005.8 KI.F 2023, ...
|