Your search returned 40 results.

Not what you expected? Check for suggestions
Sort
Results
1.
The tangled Web : a guide to securing modern Web applications / Michal Zalewski. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: San Francisco : No Starch Press, c2012
Availability: Items available for loan: Library (1)Call number: 005-2012.
2.
Assessing information security : strategies, tactics, logic and framework / A. Vladimirov, K. Gavrilenko, A. Michajlowski. by
Edition: Second edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Ely, Cambridgeshire : IT Governance Publishing, 2014
Online resources:
Availability: Items available for loan: e-Library (1).
3.
Kali Linux CTF Blueprints [electronic resource] / Cameron Buchanan. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Birmingham : Packt Publishing, 2014
Online resources:
Availability: Items available for loan: e-Library (1).
4.
Hidden hazards of online advertising : an investigation of consumer security and data privacy protection / Lillian Wallace, editor. by Series: Internet policies and issues
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: New York : Nova Science, [2014]Copyright date: ©2014
Online resources:
Availability: Items available for loan: e-Library (1).
5.
Computer forensics with FTK [electronic resource] / Fernando Carbone. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Birmingham, U.K. : Packt Pub., 2014
Other title:
  • Computer forensics with forensic toolkit
Online resources:
Availability: Items available for loan: e-Library (1).
6.
Learning Nessus for penetration testing [electronic resource] : master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment / Himanshu Kumar. by Series: Community experience distilled
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Birmingham, U.K. : Packt Publishing., 2014
Online resources:
Availability: Items available for loan: e-Library (1).
7.
Cyber resiliency, security, and cloud computing suitability in military information technology / Jesse A. Flanagan, editor. by Series: Defense, security and strategy series
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: New York : Nova Publishers, [2014]
Online resources:
Availability: Items available for loan: e-Library (1).
8.
Mobile Security [electronic resource] : How to secure, privatize and recover your devices. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Birmingham : Packt Publishing, 2013
Online resources:
Availability: Items available for loan: e-Library (1).
9.
Cyber security and IT infrastructure protection / edited by John R. Vacca. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Waltham, MA : Syngress, [2014]Copyright date: ©2014
Online resources:
Availability: Items available for loan: e-Library (1).
10.
Software security engineering [electronic resource] : design and applications / Muthu Ramachandran. by Series: Computer science, technology and applications
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: New York : Nova Science Publishers, 2012
Online resources:
Availability: Items available for loan: e-Library (1).
11.
Use, communicate and search securely on the Internet [electronic resource] : ICAICT103A : Internet Explorer 9 & Microsoft Outlook 2010 unit workbook.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Melbourne : Watsonia Publishing, c2012
Other title:
  • ICAICT103A : Internet Explorer 9 & Microsoft Outlook 2010 unit workbook
Online resources:
Availability: Items available for loan: e-Library (1).
12.
An introduction to hacking and crimeware [electronic resource] : a pocket guide / Victoria Loewengart. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Ely, Cambridgeshire : IT Governance Pub., 2012
Online resources:
Availability: Items available for loan: e-Library (1).
13.
Cloud Computing [electronic resource] : Assessing the Risks. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Ely : IT Governance Publishing, 2012
Online resources:
Availability: Items available for loan: e-Library (1).
14.
End user information security policy template [electronic resource] / by Rob Beachy. by Series: Need to Know template
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: [S.l.] : BrainMass Inc., 2012
Other title:
  • End user information systems policy
Online resources:
Availability: Items available for loan: e-Library (1).
15.
Everything you need to know about performing a network risk analysis [electronic resource] / by Rob Beachy. by Series: Need to Know series (BrainMass Inc.)
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: [S.l.] : BrainMass Inc., 2012
Online resources:
Availability: Items available for loan: e-Library (1).
16.
Nmap 6 [electronic resource] : Network exploration and security auditing Cookbook. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Birmingham : Packt Publishing, 2012
Online resources:
Availability: Items available for loan: e-Library (1).
17.
Network Backup with Bacula How-to [electronic resource]. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Birmingham : Packt Publishing, 2012
Online resources:
Availability: Items available for loan: e-Library (1).
18.
SQL injection attacks and defense [electronic resource] / Justin Clarke. by
Edition: 2nd ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Waltham, Mass. : Elsevier, 2012
Online resources:
Availability: Items available for loan: e-Library (1).
19.
Professional Penetration Testing [electronic resource] : Creating and Learning in a Hacking Lab. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Burlington : Elsevier Science, 2013
Online resources:
Availability: Items available for loan: e-Library (1).
20.
Hacking Web Apps [electronic resource] : Detecting and Preventing Web Application Security Problems. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Rockland, MA : Elsevier Science, 2012
Online resources:
Availability: Items available for loan: e-Library (1).
Pages

Powered by Koha