1251. The Darknet and Smarter Crime : Methods for Investigating Criminal Entrepreneurs and the Illicit Drug Economy /: Methods for Investigating Criminal Entrepreneurs and the Illicit Drug Economy. (2019) Authors: Bancroft, Angus Record Type: Book Extent: 1 online resource (235 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1252. Cyber security : the lifeline of information and communication technology /: the lifeline of information and communication technology. (2020) Authors: Prasad, Ramjee; Rohokale, Vandana Record Type: Book Extent: 1 online resource (xxxvi, 274 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1253. Ransomware revealed : a beginner's guide to protecting and recovering from ransomware attacks /: a beginner's guide to protecting and recovering from ransomware attacks. (2019) Authors: Hassan, Nihad A Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1254. Information Security Practice and Experience : 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings /: 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings. (2019) Editors: Heng, Swee-Huay; López, Javier Record Type: Book Extent: 1 online resource (490 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1255. Learn Kali Linux 2019 : Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark /: Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark. (2019) Authors: Singh, Glen D Record Type: Book Extent: 1 online resource (550 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1256. Unix and Linux forensic analysis DVD toolkit. (2008) Other Names: Pogue, Chris; Altheide, Cory; Haverkos, Todd Record Type: Book Extent: 1 online resource (248 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1257. SQL injection attacks and defense. (2009) Record Type: Book Extent: 1 online resource (496 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1258. Securing Citrix XenApp Server in the enterprise. (2008) Other Names: Bin Azad, Tariq; Wilson, Connie (Connie S.); Wright., Michael Record Type: Book Extent: 1 online resource (528 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1259. Advanced computing and systems for security. Volume Three ([2017]) Editors: Chaki, Rituparna; (Computer scientist), Saeed, Khalid; Cortesi, Agostino, 1963-; Chaki, Nabendu Other Names: International Doctoral Symposium on Applied Computation and Security Systems, 3rd Record Type: Book Extent: 1 online resource (xiii, 197 pages), color illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1260. Computational intelligence, cyber security and computational models : proceedings of ICC3 2015 /: proceedings of ICC3 2015. ([2016]) Editors: Senthilkumar, Muthukrishnan; Ramasamy, Vijayalakshmi; Sheen, Shina; Veeramani, C; Bonato, Anthony, 1971-; Batten, Lynn Other Names: International Conference on Computational Intelligence, Cyber Security and Computational Models Record Type: Book Extent: 1 online resource (xvi, 586 pages), color illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗