Call Number (LC) | Title | Results |
---|---|---|
QA76.9.A25 M37 2016 | Penetration testing with Raspberry Pi : learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2 / | 1 |
QA76.9.A25 M37 2022 | Incident Response with Threat Intelligence : Practical Insights into Developing an Incident Response Capability Through Intelligence-Based Threat Hunting / | 1 |
QA76.9.A25 M3735 2020ab | Cryptography : the key to digital security, how it works, and why it matters / | 2 |
QA76.9.A25 M374 2008 | Introduction to identity-based encryption / | 1 |
QA76.9.A25 M374 2008eb |
Introduction to identity-based encryption Introduction to identity-based encryption / |
2 |
QA76.9.A25 M375 2003eb | Mastering Web services security / | 1 |
QA76.9.A25 M378 2018 | Mathematical modelling for next-generation cryptography : Crest Crypto-math Project / | 1 |
QA76.9.A25 M379 2019 | Rootkits and bootkits reversing modern malware and next generation threats / | 1 |
QA76.9.A25 M38 2024 | The code of honor : embracing ethics in cybersecurity / | 1 |
QA76.9.A25 .M384 2012 | Metasploit : Das Handbuch zum Penetration-Testing-Framework. | 1 |
QA76.9.A25 M387 2000 | Maximum Linux security : a hacker's guide to protecting your Linux server and workstation / | 1 |
QA76.9.A25 M389 2003 | Maximum Security, Fourth Edition / | 1 |
QA76.9.A25 M39 2007 | Metasploit toolkit for penetration testing, exploit development, and vulnerability research / | 1 |
QA76.9.A25 M393 2013eb | Instant Java password and authentication security : a practical, hands-on guide to securing Java application passwords with hashing techniques / | 1 |
QA76.9.A25 .M395 2018 | CompTIA CSA+ cybersecurity analyst certification all-in-one exam guide (exam CS0-001) | 1 |
QA76.9.A25 M396 2007eb |
Metasploit toolkit for penetration testing, exploit development, and vulnerability research / Metasploit toolkit for penetration testing, exploit development, and vulnerability research |
2 |
QA76.9.A25 M398 2015 | Introduction to Cryptography with Open-Source Software. | 2 |
QA76.9.A25 M4249 2021 |
Cyberjutsu : cybersecurity for the modern ninja / Cyberjutsu cybersecurity for the modern ninja / |
3 |
QA76.9.A25 M4284 2005 |
Assessing and managing security risk in IT systems : a structured methodology / Assessing and managing security risk in IT systems a structured methodology / |
2 |
QA76.9.A25 M4284 2005b | Assessing and managing security risk in IT systems : a structured methodology / | 2 |