1. Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios /: enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios. (2014) Other Names: Carbone, Fernando Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Pluggable Authentication Modules : the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them /: the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them. (2007) Other Names: Geisshirt, Kenneth; Hildebrandt, Ralf; Zhen, Huang; Kulkarni, Mithil Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade antivirus software /: learn practical techniques and tactics to combat, bypass, and evade antivirus software. (2021) Authors: Yehoshua, Nir; Kosayev, Uriel Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Learning Puppet Security : secure your IT environments with the powerful secuity tools of Puppet /: secure your IT environments with the powerful secuity tools of Puppet. (2015) Authors: Slagle, Jason Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Learn Wireshark : confidently navigate the Wireshark interface and solve real-world networking problems /: confidently navigate the Wireshark interface and solve real-world networking problems. (2019) Authors: Bock, Lisa Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Learn Wireshark : a definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark /: a definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark. (2022) Authors: Bock, Lisa Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Wireshark revealed : essential skills for IT professionals /: essential skills for IT professionals. (2017) Authors: Baxter, James H; Orzach, Yoram; Mishra, Charit Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT /: using Nmap, Wireshark, Snort, Nessus, and MRGT. (2011) Other Names: Seagren, Eric Record Type: Book Extent: 1 online resource (512 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Security and privacy trends in the industrial internet of things. (2019) Editors: Alcatraz, Cristina Record Type: Book Extent: 1 online resource (xii, 310 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Wireshark for security professionals : using Wireshark and the Metasploit Framework /: using Wireshark and the Metasploit Framework. (2015) Authors: Bullock, Jessey Other Names: Gordon, Adam contributor. Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗