1. From hacking to report writing : an introduction to security and penetration testing /: an introduction to security and penetration testing. (2016) Authors: Svensson, Robert Record Type: Book Extent: 1 online resource (xxii, 190 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Enterprise cybersecurity study guide : how to build a successful cyberdefense program against advanced threats /: how to build a successful cyberdefense program against advanced threats. ([2018]) Authors: Donaldson, Scott E; Siegel, Stanley G; Williams, Chris K; Aslam, Abdul Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Pro Oracle Identity and access management suite. ([2016]) Authors: Ramey, Kenneth Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Enterprise cybersecurity : how to build a successful cyberdefense program against advanced threats /: how to build a successful cyberdefense program against advanced threats. ([2015]) Authors: Donaldson, Scott E; Siegel, Stanley G; Williams, Chris K; Aslam, Abdul Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Beginning ethical hacking with Python. (2017) Other Names: Sinha, Sanjib Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Blockchain basics : a non-technical introduction in 25 steps /: a non-technical introduction in 25 steps. ([2017]) Authors: Drescher, Daniel Other Names: Kirk, Laurence technical reviewer. Record Type: Book Extent: 1 online resource (xv, 255 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗