1. Iris biometric model for secured network access. (©2013) Other Names: Khoury, Franjieh El Record Type: Book Extent: 1 online resource (xvii, 204 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning /: over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning. (2014) Other Names: Hutchens, Justin Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Oracle Identity and Access Manager 11g for administrators : administer Oracle Identity and Access Management : installation, configuration, and day-to-day tasks /: administer Oracle Identity and Access Management : installation, configuration, and day-to-day tasks. (©2011) Other Names: Kumar, Atul Record Type: Book Extent: 1 online resource (viii, 315 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. RESTful Java web services security : secure your RESTful applications against common vulnerabilities /: secure your RESTful applications against common vulnerabilities. (2014) Other Names: Enriquez, Rene; Salazar C., Andrés Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day /: learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day. (2013) Authors: Yerrid, K. C Record Type: Book Extent: 1 online resource (ii, 48 pages :), color illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Instant SQL Server Analysis Services 2012 Cube Security. (2013) Other Names: Jayanty, Satya SK Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Mastering Microsoft Forefront UAG 2010 Customization : Discover the Secrets to Extending and Customizing Microsoft Forefront Unified Access Gateway /: Discover the Secrets to Extending and Customizing Microsoft Forefront Unified Access Gateway. (©2012) Other Names: Ben-Ari, Erez; Amara, Rainier Record Type: Book Extent: 1 online resource (iii, 173 pages), color illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Kali Linux cookbook. (2013) Other Names: Pritchett, Willie L; De Smet, David Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Agile IT security implementation methodology : plan, develop, and execute your organization's robust agile security with IBM's Senior IT Specialist /: plan, develop, and execute your organization's robust agile security with IBM's Senior IT Specialist. (©2011) Other Names: Laskowski, Jeff Record Type: Book Extent: 1 online resource (iv, 109 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗