Your search returned 16 results.

Sort
Results
1.
Cryptography engineering : design principles and practical applications / Tadayoshi Kohno, Niels Ferguson, Bruce Schneier. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley Pub., inc., c2010
Availability: Items available for loan: CamTech Library (1)Call number: 005.82 KOH .

2.
Mastering wireless penetration testing for highly secured enviroments : scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals Aaron Johns by Series: Community experience distilled
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Birmingham, UK : Packt Publishing 2015
Availability: Items available for loan: CamTech Library (1)Call number: 005.82 JOH.

3.
Python network hacking essentials Leo Earnest Wish by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Earnest Wish, Leo 2015
Availability: Items available for loan: CamTech Library (1)Call number: 005.14 EAR .

4.
Cyber Security and Digital Forensics Challenges and Future Trends Mangesh M. Ghonge, Sabyasachi Pramanik, Ramchandra Mangrulkar, Dac-Nhuong Le. by Series: Advances in Cyber Security
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: eng
Publication details: Wiley-Scrivener 2022
Other title:
  • Cyber Security and Digital Forensics Challenges and Future Trends
Availability: Items available for loan: CamTech Library (1)Call number: 005.8 GHO .

5.
The cyber security handbook : Alan Calder prepare for, respond to and recover from cyber attacks by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Ely ITGP 2020
Availability: Not available: CamTech Library: Checked out (1).

6.
Malware analyst's cookbook and DVD tools and techniques for fighting malicious code Michael Hale Ligh ... [et al.]. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Ind. Wiley 2011
Availability: Items available for loan: CamTech Library (1)Call number: 005.8 LIG .

7.
Innovation in cybersecurity education Kevin Daimi, Guillermo Francia III, editors. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cham Springer 2020
Availability: Items available for loan: CamTech Library (1)Call number: 005.8 DAI .

8.
The web application hacker's handbook : finding and exploiting security flaws / Dafydd Stuttard, Marcus Pinto. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Chichester : Wiley ; John Wiley [distributor], c2011
Availability: Items available for loan: CamTech Library (1)Call number: 005.8 STU .

9.
Advancing cyberstability Global Commission on the Stability of Cyberspace by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York EastWest Institute [2019]
Other title:
  • Final report
Availability: Items available for loan: CamTech Library (1)Call number: 005.8 CHE .

10.
Linux basics for hackers : getting started with networking, scripting, and security in Kali / OccupyTheWeb. by
Edition: First edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: San Francisco : No Starch Press, Inc., [2018]
Availability: Items available for loan: CamTech Library (1)Call number: 005.8 OCC. Not available: CamTech Library: Checked out (1).

11.
Foundations of information security : a straightforward introduction / by Jason Andress. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: San Francisco : No Starch Press, [2019]
Availability: Items available for loan: CamTech Library (1)Call number: 005.8 AND .

12.
Black Hat Go : Go programming for hackers and pentesters / Tom Steele, Chris Patten, and Dan Kottmann. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: San Francisco : No Starch Press, 2020
Availability: Items available for loan: CamTech Library (1)Call number: 005.8 STE.

13.
Threat modeling : designing for security / Adam Shostack. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, [2014]Copyright date: ©2014
Availability: Items available for loan: CamTech Library (1)Call number: 005.8 SHO.

14.
Cehv9 : Certified Ethical Hacker version 9 study guide / Sean-Philip Oriyano. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, Indiana : Sybex, a Wiley brand, [2016]
Availability: Items available for loan: CamTech Library (1)Call number: 005.8 ORI.

15.
Hacking with Kali Linux : A Complete Guide for Beginners to Study Basic Hacking, Cybersecurity, Wireless Networks and Pen Testing Jack Mathew by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for loan: CamTech Library (1)Call number: 005.87 MAT.

16.
Rootkits and bootkits : reversing modern malware and next generation threats / by Alex Matsorov, Eugene Rodionov, and Sergey Bratus. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: San Francisco : No Starch Press, [2019]
Availability: Items available for loan: CamTech Library (1)Call number: 005.8 MAT.

Pages