1. Metasploit toolkit for penetration testing, exploit development, and vulnerability research. (2011) Other Names: Maynor, David; Mookhey, K. K Record Type: Book Extent: 1 online resource (350 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Mobile data loss prevention. (2015) Authors: Raggo, Michael T Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Cisco security professional's guide to secure intrusion detection systems. (2003) Other Names: Burton, James; Dubrawsky, Ida; Osipov, Vitaly; Baumrucker, C. Tate; Sweeney, Michael Record Type: Book Extent: 1 online resource (656 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Snort : IDS and IPS toolkit /: IDS and IPS toolkit. (©2007) Other Names: Beale, Jay; Baker, Andrew R; Esler, Joel Record Type: Book Extent: 1 online resource (xxxiv, 730 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Breaking into information security : crafting a custom career path to get the job you really want /: crafting a custom career path to get the job you really want. (2016) Authors: More, Josh; Stieber, Anthony J; Liu, Chris Editors: Friedman, Beth Record Type: Book Extent: 1 online resource (265 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. How to cheat at securing SQL server 2005. (©2007) Other Names: Blum, Timothy; Horninger, Mark Record Type: Book Extent: 1 online resource (xvii, 400 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Advanced persistent threat : understanding the danger and how to protect your organization /: understanding the danger and how to protect your organization. (©2013) Other Names: Cole, Eric Record Type: Book Extent: 1 online resource (xvi, 290 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Snort : IDS and IPS toolkit /: IDS and IPS toolkit. (©2007) Other Names: Beale, Jay; Baker, Andrew R; Esler, Joel Record Type: Book Extent: 1 online resource (xxxiv, 730 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. The basics of information security : understanding the fundamentals of InfoSec in theory and practice /: understanding the fundamentals of InfoSec in theory and practice. (2014) Authors: Andress, Jason Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Dissecting the hack : the V3rb0t3n network /: the V3rb0t3n network. (2015) Authors: Street, Jayson E; Sims, Kristin; Baskin, Brian Record Type: Book Extent: 1 online resource (xxi, 283 pages), illustrations (colour) View Content: Available online (eLD content is only available in our Reading Rooms) ↗