Skip to content
You are not logged in |Login  
     
Limit search to available items
Result page:    
Subjects (1-50 of 53)
Computers -- Access control.
1
Bestseller
BestsellerE-book
 
2
Bestseller
BestsellerE-book
 
3
book
BookPrinted Material
 

Item Status

Location Call No. Status OPAC Message Public Note Gift Note
 Moore Stacks  QA76.9.A25 .A275 2008    Available  ---
4
Bestseller
BestsellerE-book
 

Item Status

5
Bestseller
BestsellerE-book
 

Item Status

6
Bestseller
BestsellerE-book
 

Item Status

7
Bestseller
BestsellerE-book
 

Attribute-Based Access Control.


Hu, Vincent.
Boston, MA : Artech House, 2018.

Rating:

Item Status

8
Bestseller
BestsellerE-book
 

The audacity to spy : how government, business, and hackers rob us of privacy


Nolan, Catherine.
Basking Ridge, NJ : Technics Publications, 2014.
1st ed.

Rating:

Item Status

9
Bestseller
BestsellerE-book
 

Item Status

10
Bestseller
BestsellerE-book
 

Becoming the hacker : the playbook for getting inside the mind of an attacker


Pruteanu, Adrian, author.
Birmingham : Packt Publishing Ltd, 2019.

Rating:

Item Status

11
Bestseller
BestsellerE-book
 

Building a pentesting lab for wireless networks : build your own secure enterprise or home penetrati


Fadyushin, Vyacheslav, author.
Birmingham, UK : Packt Publishing, 2016.

Rating:

Item Status

12
Bestseller
BestsellerE-book
 
13
Bestseller
BestsellerE-book
 

Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtu


Cardwell, Kevin, author.
Birmingham : Packt Publishing, [2016].
Second edition.

Rating:

Item Status

14
book
BookPrinted Material
 

Computer control and security : a guide for managers and systems analysts


Perry, William E.
New York : Wiley, [1981]

Rating:

 

Item Status

Location Call No. Status OPAC Message Public Note Gift Note
 Moore Stacks  HF5548.2 .P4728    Available  ---
15
book
BookPrinted Material
 

Computer crime : computer security techniques.



Washington, D.C. : U.S. Dept. of Justice, Bureau of Justice Statistics : [Supt. of Docs., U.S. G.P.O., distributor], 1982.

Rating:

 

Item Status

Location Call No. Status OPAC Message Public Note Gift Note
 Moore Stacks  658.478 C738    Available  ---
16
Bestseller
BestsellerE-book
 

Formal models and techniques for analyzing security protocols



Amsterdam ; da Washington, DC : IOS Press, [2011]

Rating:

Item Status

17
Bestseller
BestsellerE-book
 

Git essentials : create, merge, and distribute code with Git, the most powerful and flexible version


Santacroce, Ferdinando, author.
Birmingham, UK : Packt Publishing, 2015.

Rating:

Item Status

18
Bestseller
BestsellerE-book
 

Git : mastering version control : learn everything you need to take full control of your workflow wi


Santacroce, Ferdinando, author.
Birmingham, UK : Packt Publishing, 2016.

Rating:

Item Status

19
Bestseller
BestsellerE-book
 

Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tool


Bramwell, Phil, author.
Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis

Rating:

Item Status

20
Bestseller
BestsellerE-book
 
21
book
BookPrinted Material
 

Item Status

Location Call No. Status OPAC Message Public Note Gift Note
 Moore Stacks  QA76.9.A25 D45 1992    Withdrawn  ---
 Moore Stacks  QA76.9.A25 D45 1992    Available  ---
22
Bestseller
BestsellerE-book
 

Infosecurity 2008 threat analysis



Burlington, MA : Syngress Pub., [2008]

Rating:

Item Status

23
Bestseller
BestsellerE-book
 

Item Status

24
Bestseller
BestsellerE-book
 

Instant Kali Linux.


Singh, Abhinav.
Birmingham [UK] : Packt Publishing, 2013.

Rating:

Item Status

25
Bestseller
BestsellerE-book
 
26
Bestseller
BestsellerE-book
 
27
Bestseller
BestsellerE-book
 

Integrated security systems design : concepts, specifications, and implementation


Norman, Thomas L.
Amsterdam ; Boston : Elsevier Butterworth-Heinemann, [2007]

Rating:

Item Status

28
book
BookPrinted Material
 

Internet and intranet security management : risks and solutions


Janczewski, Lech, 1943-
Hershey, PA : Idea Group Pub., 2000.

Rating:

 

Item Status

Location Call No. Status OPAC Message Public Note Gift Note
 Moore Stacks  TK5105.875.I57 J358 2000    Available  ---
29
Bestseller
BestsellerE-book
 

IT ethics handbook : right and wrong for IT professionals


Northcutt, Stephen.
Rockland, MA. : Syngress Pub., 2004.

Rating:

Item Status

30
Bestseller
BestsellerE-book
 

Kali Linux 2


Halton, Wolf, author.
Birmingham, UK : Packt Publishing, 2016.

Rating:

Item Status

31
Bestseller
BestsellerE-book
 

Kali Linux 2 : assuring security by penetration testing


Johansen, Gerard, author.
Birmingham, UK : Packt Publishing, 2016.
Third edition.

Rating:

Item Status

32
Bestseller
BestsellerE-book
 

Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and t


Sharma, Himanshu, author.
Birmingham, UK : Packt Publishing, 2019.
Second edition.

Rating:

Item Status

33
Bestseller
BestsellerE-book
 
34
Bestseller
BestsellerE-book
 

Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to s


Buchanan, Cameron, author.
Birmingham, UK : Packt Publishing, 2017.
Third edition.

Rating:

Item Status

35
Bestseller
BestsellerE-book
 

Learning metasploit exploitation and development


Balapure, Aditya, author.
Birmingham : Packt Publishing, 2013.

Rating:

Item Status

36
Bestseller
BestsellerE-book
 

Mastering Metasploit


Jaswal, Nipun.
Birmingham : Packt Publishing, 2014.

Rating:

Item Status

37
Bestseller
BestsellerE-book
 

Mastering metasploit : exploit systems, cover your tracks, and bypass security controls with the Met


Jaswal, Nipun, author.
Birmingham : Packt Publishing, 2020.
Fourth edition.

Rating:

Item Status

38
Bestseller
BestsellerE-book
 

Item Status

39
Bestseller
BestsellerE-book
 

Mastering Metasploit : take your penetration testing and IT security skills to a whole new level wit


Jaswal, Nipun, author.
Birmingham, UK : Packt Publishing, 2018.
Third edition.

Rating:

Item Status

40
Bestseller
BestsellerE-book
 

Mastering wireless penetration testing for highly secured environments : scan, exploit, and crack wi


Johns, A. (Aaron), author.
Birmingham, England : Packt Publishing, 2015.

Rating:

Item Status

41
Bestseller
BestsellerE-book
 
42
Bestseller
BestsellerE-book
 

Item Status

43
Bestseller
BestsellerE-book
 

Metasploit Penetration Testing Cookbook : Over 80 Recipes to Master the Most Widely Used Penetration


Agarwal, Monika.
Birmingham, UK : Packt Publishing, 2013.
Second edition.

Rating:

Item Status

44
Bestseller
BestsellerE-book
 

Metasploit Revealed.


Rahalkar, Sagar.
Birmingham : Packt Publishing, 2017.

Rating:

Item Status

45
book
BookPrinted Material
 

The net delusion : how not to liberate the world


Morozov, Evgeny.
London : Allen Lane, 2011.

Rating:

 

Item Status

46
book
BookPrinted Material
 

The net delusion : the dark side of Internet freedom


Morozov, Evgeny.
New York, NY : PublicAffairs, [2011]
1st ed.

Rating:

Item Status

Location Call No. Status OPAC Message Public Note Gift Note
 Moore Stacks  HM851 .M665 2011    Available  ---
47
Bestseller
BestsellerE-book
 
48
Bestseller
BestsellerE-book
 

Penetration tester's open source toolkit



Rockland, Mass. : Syngress Pub., [2006]

Rating:

Item Status

49
Bestseller
BestsellerE-book
 

Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and N


Chauhan, Ajay Singh, author.
Birmingham, UK : Packt Publishing, 2018.

Rating:

Item Status

50
Bestseller
BestsellerE-book
 

Relation based access control


Zhang, Rui, author.
Heidelberg : AKA : Ios Press, [2010]

Rating:

Item Status

Resources
More Information
Result page: