Your search returned 10 results.

Sort
Results
1.
Mastering wireless penetration testing for highly secured enviroments : scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals Aaron Johns by Series: Community experience distilled
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Birmingham, UK : Packt Publishing 2015
Availability: Items available for loan: CamTech Library (1)Call number: 005.82 JOH.

2.
The cyber security handbook : Alan Calder prepare for, respond to and recover from cyber attacks by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Ely ITGP 2020
Availability: Not available: CamTech Library: Checked out (1).

3.
Pentesting Azure applications: the definitive guide to testing and securing deployments / by Matt Burrough. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: eng Publisher: San Francisco : No Starch Press, 2018
Availability: Items available for loan: CamTech Library (1)Call number: 305.8 BUR .

4.
The web application hacker's handbook : finding and exploiting security flaws / Dafydd Stuttard, Marcus Pinto. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Chichester : Wiley ; John Wiley [distributor], c2011
Availability: Items available for loan: CamTech Library (1)Call number: 005.8 STU .

5.
Hacking With Experts By Anurag Dwivedi by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for loan: CamTech Library (1)Call number: 005.8 ANU .

6.
The car hacker's handbook : a guide for the penetration tester / by Craig Smith. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: San Francisco : No Starch Press, [2016]
Availability: Items available for loan: CamTech Library (1)Call number: 629.2 SMI .

7.
Foundations of information security : a straightforward introduction / by Jason Andress. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: San Francisco : No Starch Press, [2019]
Availability: Items available for loan: CamTech Library (1)Call number: 005.8 AND .

8.
Threat modeling : designing for security / Adam Shostack. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, [2014]Copyright date: ©2014
Availability: Items available for loan: CamTech Library (1)Call number: 005.8 SHO.

9.
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. by
Edition: 20th anniversary edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, [2015]
Availability: Items available for loan: CamTech Library (1)Call number: 005.82 SCH.

10.
Hacking with Kali Linux : A Complete Guide for Beginners to Study Basic Hacking, Cybersecurity, Wireless Networks and Pen Testing Jack Mathew by
Material type: Text Text; Format: print ; Literary form: Not fiction
Availability: Items available for loan: CamTech Library (1)Call number: 005.87 MAT.

Pages