1391. Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack /: beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack. (2017) Authors: Buchanan, Cameron; Ramachandran, Vivek Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1392. Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics /: infrastructure security with Red Team and Blue Team tactics. (2018) Authors: Diogenes, Yuri; Ozkaya, Erdal Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1393. Digital resilience : is your company ready for the next cyber threat? /: is your company ready for the next cyber threat?. ([2018]) Authors: Rothrock, Ray A Other Names: Clarke, Richard A writer of foreword. Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1394. VMware NSX Cookbook : Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere /: Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere. (2018) Authors: Sangha, Tony; Wibowo, Bayu Record Type: Book Extent: 1 online resource (584 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1395. Cloud Security Automation : Get to grips with automating your cloud security on AWS and OpenStack /: Get to grips with automating your cloud security on AWS and OpenStack. (2018) Authors: Priyam, Prashant Record Type: Book Extent: 1 online resource (334 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1396. Preventing ransomware : understand, prevent, and remediate ransomware attacks /: understand, prevent, and remediate ransomware attacks. (2018) Authors: Mohanta, Abhijit; Hahad, Mounir; Velmurugan, Kumaraguru Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1397. Security software development : assessing and managing security risks /: assessing and managing security risks. (©2009) Other Names: Ashbaugh, Douglas A Record Type: Book Extent: 1 online resource (xvii, 313 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1398. Agile IT security implementation methodology : plan, develop, and execute your organization's robust agile security with IBM's Senior IT Specialist /: plan, develop, and execute your organization's robust agile security with IBM's Senior IT Specialist. (©2011) Other Names: Laskowski, Jeff Record Type: Book Extent: 1 online resource (iv, 109 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1399. Computer security : principles and practice /: principles and practice. (2019) Authors: Stallings, William; Brown, Lawrie Record Type: Book Extent: 1 online resource (800 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1400. DNS security management. ([2017]) Authors: (Computer scientist), Dooley, Michael; Rooney, Tim Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗