Your search returned 9 results.

Sort
Results
1.
Mastering wireless penetration testing for highly secured enviroments : scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals Aaron Johns by Series: Community experience distilled
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Birmingham, UK : Packt Publishing 2015
Availability: Items available for loan: CamTech Library (1)Call number: 005.82 JOH.

2.
Pentesting Azure applications: the definitive guide to testing and securing deployments / by Matt Burrough. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: eng Publisher: San Francisco : No Starch Press, 2018
Availability: Items available for loan: CamTech Library (1)Call number: 305.8 BUR .

3.
The web application hacker's handbook : finding and exploiting security flaws / Dafydd Stuttard, Marcus Pinto. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Chichester : Wiley ; John Wiley [distributor], c2011
Availability: Items available for loan: CamTech Library (1)Call number: 005.8 STU .

4.
Hacking With Experts By Anurag Dwivedi by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for loan: CamTech Library (1)Call number: 005.8 ANU .

5.
The car hacker's handbook : a guide for the penetration tester / by Craig Smith. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: San Francisco : No Starch Press, [2016]
Availability: Items available for loan: CamTech Library (1)Call number: 629.2 SMI .

6.
Foundations of information security : a straightforward introduction / by Jason Andress. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: San Francisco : No Starch Press, [2019]
Availability: Items available for loan: CamTech Library (1)Call number: 005.8 AND .

7.
Threat modeling : designing for security / Adam Shostack. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, [2014]Copyright date: ©2014
Availability: Items available for loan: CamTech Library (1)Call number: 005.8 SHO.

8.
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. by
Edition: 20th anniversary edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, [2015]
Availability: Items available for loan: CamTech Library (1)Call number: 005.82 SCH.

9.
Hacking with Kali Linux : A Complete Guide for Beginners to Study Basic Hacking, Cybersecurity, Wireless Networks and Pen Testing Jack Mathew by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for loan: CamTech Library (1)Call number: 005.87 MAT.

Pages