1. Privacy-preserved data publishing of evolving online social networks. Issue 1 (2nd January 2016) Authors: Chang, Wei; Wu, Jie Journal: Journal of information privacy & security Issue: Volume 12:Issue 1(2016) Page Start: 14 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Recent survey of various defense mechanisms against phishing attacks. Issue 1 (2nd January 2016) Authors: Tewari, Aakanksha; Jain, A. K.; Gupta, B. B. Journal: Journal of information privacy & security Issue: Volume 12:Issue 1(2016) Page Start: 3 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Mechanism design for Data Replica Placement (DRP) problem in strategic settings. Issue 1 (2nd January 2016) Authors: Guo, Minzhe; Bhattacharya, Prabir Journal: Journal of information privacy & security Issue: Volume 12:Issue 1(2016) Page Start: 32 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Special Issue on Attacks and Distinct Features in Networks. Issue 1 (2nd January 2016) Authors: Agrawal, Dharma P. Journal: Journal of information privacy & security Issue: Volume 12:Issue 1(2016) Page Start: 1 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Windows security monitoring : scenarios and patterns /: scenarios and patterns. (2018) Authors: Miroshnikov, Andreĭ Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. A multidisciplinary introduction to information security. (2011) Other Names: Mjølsnes, Stig F Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Metasploit penetration testing cookbook : over 70 recipes to master the most widely used penetration testing framework /: over 70 recipes to master the most widely used penetration testing framework. (2018) Authors: Singh, Abhinav Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Advanced Infrastructure Penetration Testing : Defend your systems from methodized and proficient attackers /: Defend your systems from methodized and proficient attackers. (2018) Authors: Chebbi, Chiheb Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux /: a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux. (2018) Other Names: Muniz, Joseph; Lakhani, Aamir Record Type: Book Extent: 1 online resource (426 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Cyber Security Skills and the UK's Critical National Infrastructure : Second Report of Session 2017-19.: Second Report of Session 2017-19. Report / Volume 1, ([2018-07-19]) Other Names: Great Britain., Parliament., Joint Committee on National Security Strategy. Record Type: Book Extent: 1 online resource (39 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗