Your search returned 53 results.

Sort
Results
41.
The hacker playbook 3 : Practical guide to penetration testing / Peter Kim. by
Edition: First edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: [place of publication not identified] : Secure Planet LLC, 2018
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 KI.T 2018. Not available: The Knowledge Hub Library : Checked out (2).
Lists:

42.
Mastering python for networking and security : leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues / José Manuel Ortega. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Birmingham : Packt Publishing, 2020
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 OR.M 2020, ...

43.
Practical web penetration testing : secure web applications using Burp Suite, Nmap, Metasploit, and more / Gus Khawaja. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Birmingham, UK : Packt Publishing, 2018
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.758 KH.P 2018. Not available: The Knowledge Hub Library : Checked out (1).
Lists:

44.
Hacking with Kali : practical penetration testing techniques / James Broad, Andrew Bindner. by
Edition: First edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Amsterdam ; Boston : Syngress, an imprint of Elsevier, 2014
Online resources:
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (3)Call number: 005.8 BR.H 2014, ... Not available: The Knowledge Hub Library : Checked out (2).
Lists:

45.
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : John Wiley & Sons, Inc., 2014
Other title:
  • Detecting malware and threats in Windows, Linux, and Mac memory
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 004.50285/58 LI.A 2014, ...

46.
Professional penetration testing / Thomas Wilhelm, Matthew Neely, technical editor. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Amsterdam : Syngress, an imprint of Elsevier, [2013
Online resources:
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (5)Call number: 005.8 WI.P 2013, ...
Lists:

47.
Cyber security management : a governance, risk and compliance framework / Peter Trim, Yang-Im Lee. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Burlington, VT : Gower, 2020
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (4)Call number: 005.8076 TR.C 2020, ...

48.
Introduction to modern cryptography / Jonathan Katz and Yehuda Lindell. by
Edition: Third edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boca Raton, Florida : Chapman & Hall / CRC Press, Taylor & Francis Group, 2021
Online resources:
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (4)Call number: 005.82 KA.I 2021, ...

49.
Cybersecurity data science projects for students : beginner projects to learn the field and build up your resume / Emmanuel Tsukerman. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: [place of publication not identified] : Independently published, 2020
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 TS.C 2020. Items available for reference: The Knowledge Hub Library : Not For Loan (2)Call number: 005.8 TS.C 2020, ... Not available: The Knowledge Hub Library : Checked out (2).

50.
Learning Metasploit Exploitation and Development / Balapure, Aditya. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Birmingham, England : Packt Publishing, 2013
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (1)Call number: 005.8 BA.L 2013.

51.
Fundamentals of information systems security / David Kim, Michael G. Solomon. by
Edition: Fourth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Burlington, Massachusetts : Jones & Bartlett Learning, 2023
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 KI.F 2023. Items available for reference: The Knowledge Hub Library : Not For Loan (3)Call number: 005.8 KI.F 2023, ...

52.
Metasploit : the penetration tester's guide / by David Kennedy [and others]. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: San Francisco : No Starch Press, 2011
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 KE.M 2011. Not available: The Knowledge Hub Library : Checked out (1).

53.
Real World Cryptography David Wong by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Manning Manning 2021
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.82 WO.R 2021. Not available: The Knowledge Hub Library : Checked out (1).

Pages