1. Nmap 6 : network exploration and security auditing Cookbook /: network exploration and security auditing Cookbook. (2012) Other Names: Pale, Paulino Calderon Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Mastering the Nmap scripting engine : master the Nmap scripting engine and the art of developing NSE scripts /: master the Nmap scripting engine and the art of developing NSE scripts. (2015) Authors: Pale, Paulino Calderón Record Type: Book Extent: 1 online resource (244 pages), illustrations (some color), tables View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Nmap - network exploration and security auditing cookbook. (2021) Authors: Calderon, Paulino Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Nmap in the enterprise : your guide to network scanning /: your guide to network scanning. (2011) Other Names: Orebaugh, Angela; Pinkard, Becky Record Type: Book Extent: 1 online resource (264 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Demystifying cryptography with OpenSSL 3 : discover the best techniques to enhance your network security with OpenSSL 3.0 /: discover the best techniques to enhance your network security with OpenSSL 3.0. (2022) Authors: Khlebnikov, Alexei; Adolfsen, Jarle Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Wireshark network security : a succinct guide to securely administer your network using Wireshark /: a succinct guide to securely administer your network using Wireshark. (2015) Authors: Verma, Piyush Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Data exfiltration threats and prevention techniques machine learning and memory-based data security. (2023) Authors: Tari, Zahir, 1961-; Sohrabi, Nasrin, 1982-; Samadi, Yasaman, 1993-; Suaboot, Jakapan, 1984- Record Type: Book Extent: 1 online resource (288 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Nmap - network exploration and security auditing cookbook. (2017) Authors: Calderon, Paulino Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Secure data management for online learning applications. (2023) Editors: Deborah, L. Jegatha; Vijayakumar, P; Gupta, Brij, 1982-; Pelusi, Danilo Record Type: Book Extent: 1 online resource (276 pages), illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessus /: capture network vulnerabilities using standard tools such as Nmap and Nessus. (2018) Authors: Cox, Jacob; Singh, Ajay Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗