1301. Blockchain Development with Hyperledger : Build decentralized applications with Hyperledger Fabric and Composer /: Build decentralized applications with Hyperledger Fabric and Composer. (2019) Authors: Baset, Salman A; Desrosiers, Luc; Gaur, Nitin; Novotný, Petr; O'Dowd, Anthony; Ramakrishna, Venkatraman; Sun, Weimin; Wu, Xun (Brian) Record Type: Book Extent: 1 online resource (636 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1302. Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testing /: practical recipes that combine strategies, attacks, and tools for advanced penetration testing. (2019) Authors: Sharma, Himanshu Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1303. Securing Network Infrastructure : Discover practical network security with Nmap and Nessus 7 /: Discover practical network security with Nmap and Nessus 7. (2019) Authors: Jetty, Sairam; Rahalkar, Sagar Record Type: Book Extent: 1 online resource (538 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1304. Reinforcement learning for cyber-physical systems with cybersecurity case studies. (2019) Authors: Li, Chong, 1985-; Qiu, Meikang Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1305. Windows OS forensics. (2016) Authors: Shaaban, Ayman; Sapronov, Konstantin Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1306. Cyber operations : building, defending, and attacking modern computer networks /: building, defending, and attacking modern computer networks. (2019) Authors: O'Leary, Mike, 1968- Record Type: Book Extent: 1 online resource (xxxi, 1136 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1307. Computational science -- ICCS 2018 : 18th International Conference, Wuxi, China, June 11-13, 2018, Proceedings.: 18th International Conference, Wuxi, China, June 11-13, 2018, Proceedings. Part I (2018) Editors: Shi, Yong; Fu, Haohuan; Tian, Yingjie; Krzhizhanovskaya, Valeria V; Lees, Michael Harold; Dongarra, Jack; Sloot, Peter M. A Other Names: ICCS 2018 Record Type: Book Extent: 1 online resource (xxxiv, 730 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1308. RIOT control : understanding and managing risks and the Internet of Things /: understanding and managing risks and the Internet of Things. (2015) Authors: Macaulay, Tyson; Brown, Greg Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1309. Hands-On Penetration Testing with Kali NetHunter : Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go /: Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go. (2019) Authors: Singh, Glen D; Oriyano, Sean-Philip Record Type: Book Extent: 1 online resource (302 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1310. Professional Red teaming : conducting successful cybersecurity engagements /: conducting successful cybersecurity engagements. (2019) Authors: Oakley, Jacob G Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗