1. IoT applications, security threats, and countermeasures. (2021) Editors: Nayak, Padmalaya; Ray, Niranjan K, 1974-; (Educator), Ravichandran, P Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Threat hunting with elastic stack : solve complex security challenges with integrated prevention, detection, and response /: solve complex security challenges with integrated prevention, detection, and response. (2021) Authors: Pease, Andrew Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. There's a war going on but no one can see it. (2021) Authors: Modderkolk, Huib Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. The U.S. cybersecurity and intelligence analysis challenges. (2022) Authors: Weaver, John Michael Record Type: Book Extent: 1 online resource, illustrations (black and white, and colour) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. The foundations of threat hunting : organize and design effective cyber threat hunts to meet business needs /: organize and design effective cyber threat hunts to meet business needs. (2022) Authors: Maurice, Chad; Thompson, Jeremy; Copeland, William Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Incident response with threat intelligence : practical insights into developing an incident response capability through intelligence-based threat hunting /: practical insights into developing an incident response capability through intelligence-based threat hunting. (2022) Authors: Martinez, Roberto Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Zed attack proxy cookbook : hacking tactics, techniques, and procedures for testing web applications and APIs using OWASP ZAP /: hacking tactics, techniques, and procedures for testing web applications and APIs using OWASP ZAP. (2023) Authors: Soper, Ryan; Torres, Nèstor; Almoailu, Ahmed Record Type: Book Extent: 1 online resource (392 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Big data analytics and intelligent systems for cyber threat intelligence. (2023) Editors: Maleh, Yassine, 1987-; Alazab, Mamoun, 1980-; Tawalbeh, Loai; Romdhani, Imed Record Type: Book Extent: 1 online resource (280 pages), illustrations (black and white, and colour) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Cyber threat intelligence. (2023) Authors: (Computer security expert), Lee, Martin Record Type: Book Extent: 1 online resource (304 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Distributed denial of service (DDOS) attacks : classification, attacks, challenges and countermeasures /: classification, attacks, challenges and countermeasures. (2021) Authors: Gupta, Brij, 1982-; Dahiya, Amrita Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗