1. Metasploit penetration testing cookbook : over 70 recipes to master the most widely used penetration testing framework /: over 70 recipes to master the most widely used penetration testing framework. (2018) Authors: Singh, Abhinav Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Advanced Infrastructure Penetration Testing : Defend your systems from methodized and proficient attackers /: Defend your systems from methodized and proficient attackers. (2018) Authors: Chebbi, Chiheb Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux /: a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux. (2018) Other Names: Muniz, Joseph; Lakhani, Aamir Record Type: Book Extent: 1 online resource (426 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Zabbix 1.8 network monitoring : monitor your network's hardware, servers, and web performance effectively and efficiently /: monitor your network's hardware, servers, and web performance effectively and efficiently. (2010) Other Names: Olups, Rihards Record Type: Book Extent: 1 online resource (428 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. PfSense 2.x Cookbook : Manage and maintain your network using pfSense, 2nd Edition /: Manage and maintain your network using pfSense, 2nd Edition. (2018) Authors: Zientara, David Record Type: Book Extent: 1 online resource (298 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Hands-on machine learning for cybersecurity : safeguard your system by making your machines intelligent using the Python ecosystem /: safeguard your system by making your machines intelligent using the Python ecosystem. (2018) Authors: Halder, Soma; Ozdemir, Sinan Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Blockchain Developer's Guide : Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda /: Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda. (2018) Authors: Hill, Brenn; Chopra, Samanyu; Valencourt, Paul; Prusty, Narayan Record Type: Book Extent: 1 online resource (564 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Learning Android Forensics : Analyze Android devices with the latest forensic tools and techniques, 2nd Edition /: Analyze Android devices with the latest forensic tools and techniques, 2nd Edition. (2018) Authors: Skulkin, Oleg; Tindall, Donnie; Tamma, Rohit Record Type: Book Extent: 1 online resource (328 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Hands-On Enterprise Application Development with Python : Design data-intensive Application with Python 3 /: Design data-intensive Application with Python 3. (2018) Authors: Badhwar, Saurabh Record Type: Book Extent: 1 online resource (374 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Learn Microsoft Azure : Build, manage, and scale cloud applications using the Azure ecosystem /: Build, manage, and scale cloud applications using the Azure ecosystem. (2018) Authors: Wali, Mohamed Record Type: Book Extent: 1 online resource (354 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗