Call Number (LC) Title Results
QA76.9.A25 M37 2016 Penetration testing with Raspberry Pi : learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2 / 1
QA76.9.A25 M37 2022 Incident Response with Threat Intelligence : Practical Insights into Developing an Incident Response Capability Through Intelligence-Based Threat Hunting / 1
QA76.9.A25 M3735 2020ab Cryptography : the key to digital security, how it works, and why it matters / 2
QA76.9.A25 M374 2008 Introduction to identity-based encryption / 1
QA76.9.A25 M374 2008eb Introduction to identity-based encryption
Introduction to identity-based encryption /
2
QA76.9.A25 M375 2003eb Mastering Web services security / 1
QA76.9.A25 M378 2018 Mathematical modelling for next-generation cryptography : Crest Crypto-math Project / 1
QA76.9.A25 M379 2019 Rootkits and bootkits reversing modern malware and next generation threats / 1
QA76.9.A25 M38 2024 The code of honor : embracing ethics in cybersecurity / 1
QA76.9.A25 .M384 2012 Metasploit : Das Handbuch zum Penetration-Testing-Framework. 1
QA76.9.A25 M387 2000 Maximum Linux security : a hacker's guide to protecting your Linux server and workstation / 1
QA76.9.A25 M389 2003 Maximum Security, Fourth Edition / 1
QA76.9.A25 M39 2007 Metasploit toolkit for penetration testing, exploit development, and vulnerability research / 1
QA76.9.A25 M393 2013eb Instant Java password and authentication security : a practical, hands-on guide to securing Java application passwords with hashing techniques / 1
QA76.9.A25 .M395 2018 CompTIA CSA+ cybersecurity analyst certification all-in-one exam guide (exam CS0-001) 1
QA76.9.A25 M396 2007eb Metasploit toolkit for penetration testing, exploit development, and vulnerability research /
Metasploit toolkit for penetration testing, exploit development, and vulnerability research
2
QA76.9.A25 M398 2015 Introduction to Cryptography with Open-Source Software. 2
QA76.9.A25 M4249 2021 Cyberjutsu : cybersecurity for the modern ninja /
Cyberjutsu cybersecurity for the modern ninja /
3
QA76.9.A25 M4284 2005 Assessing and managing security risk in IT systems : a structured methodology /
Assessing and managing security risk in IT systems a structured methodology /
2
QA76.9.A25 M4284 2005b Assessing and managing security risk in IT systems : a structured methodology / 2