1. Windows security monitoring : scenarios and patterns /: scenarios and patterns. (2018) Authors: Miroshnikov, Andreĭ Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. A multidisciplinary introduction to information security. (2011) Other Names: Mjølsnes, Stig F Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux /: a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux. (2018) Other Names: Muniz, Joseph; Lakhani, Aamir Record Type: Book Extent: 1 online resource (426 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Practical cyber intelligence : how action-based intelligence can be an effective response to incidents /: how action-based intelligence can be an effective response to incidents. (2018) Authors: Jr, Bautista, Wilson Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Hands-on red team tactics : a practical guide to mastering red team operations /: a practical guide to mastering red team operations. (2018) Authors: Sharma, Himanshu; Singh, Harpreet Record Type: Book Extent: 1 online resource (469 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Applications and Techniques in Information Security : 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, proceedings /: 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, proceedings. (2015) Editors: Niu, Wenjia; (Computer scientist), Li, Gang; Liu, Jiqiang; Tan, Jianlong; Guo, Li; Han, Zhen; Batten, Lynn Other Names: ATIS (Conference), 6th Record Type: Book Extent: 1 online resource (xvii, 398 pages), color illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Risks and security of internet and systems : 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014. Revised selected papers /: 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014. Revised selected papers. (2015) Editors: López, Javier; (Computer scientist), Ray, Indrajit; Crispo, Bruno Other Names: CRiSIS (Conference), 9th Record Type: Book Extent: 1 online resource (xi, 275 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Cisco security professional's guide to secure intrusion detection systems. (2003) Other Names: Burton, James; Dubrawsky, Ida; Osipov, Vitaly; Baumrucker, C. Tate; Sweeney, Michael Record Type: Book Extent: 1 online resource (656 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Advanced persistent training : take your security awareness program to the next level /: take your security awareness program to the next level. (2017) Authors: Schroeder, Jordan Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Cyber security on Azure : an IT professionals guide to Microsoft Azure security center /: an IT professionals guide to Microsoft Azure security center. (2017) Other Names: Copeland, Marshall Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗