Results
|
1.
|
|
|
2.
|
|
|
3.
|
|
|
4.
|
|
|
5.
|
Hacking : the art of exploitation / Jon Erickson. by
Edition: Second edition.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: California : William Pollock, 2008
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 / ER.H 2008, ...
|
|
6.
|
|
|
7.
|
|
|
8.
|
|
|
9.
|
|
|
10.
|
Reversing : secrets of reverse engineering / Eldad Eilam. by
Material type: Text; Format:
print
; Literary form:
Not fiction
Indianapolis, IN : Wiley Publishing, Inc, 2005
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (5)Call number: 005.1 EI.R 2005, ...
|
|
11.
|
|
|
12.
|
|
|
13.
|
|
|
14.
|
|
|
15.
|
|
|
16.
|
|
|
17.
|
|
|
18.
|
|
|
19.
|
Cyber security : law and guidance / Helen Wong. by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: London : Bloomsbury Professional, 2018
Availability: Items available for loan: The Knowledge Hub Library (8)Call number: 005.8 MB.C 2018, ...
|
|
20.
|
Computer security / Dieter Gollmann. by
Edition: Third edition.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: Chichester, West Sussex : Wiley, 2011
Availability: Items available for loan: The Knowledge Hub Library (11)Call number: 005.8 GO.C 2011, ...
|