1581. Designing and building security operations center. (2014) Authors: Nathans, David Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1582. Python penetration testing essentials : techniques for ethical hacking with Python /: techniques for ethical hacking with Python. (2018) Authors: Mohit Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1583. US Power and the Internet in International Relations : the Irony of the Information Age /: the Irony of the Information Age. (2016) Authors: Carr, Madeline Record Type: Book Extent: 1 online resource (viii, 221 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1584. Stealing the network : how to own a shadow /: how to own a shadow. (©2007) Other Names: Long, Johnny; Russell, Ryan, 1969-; Mullen, Timothy M; Pinzon, Scott Record Type: Book Extent: 1 online resource (xxxvi, 409 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1585. Security de-engineering : solving the problems in information risk management /: solving the problems in information risk management. (©2012) Other Names: Tibble, Ian Record Type: Book Extent: 1 online resource (xxxvii, 294 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1586. International IT Governance : An Executive Guide to ISO 17799/ISO 27001 /: An Executive Guide to ISO 17799/ISO 27001. (2007) Authors: Calder, Alan, 1957-; Watkins, Steve, 1970- Record Type: Book Extent: 1 online resource (xii, 366 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1587. Mastering Metasploit : Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit, 3rd Edition /: Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit, 3rd Edition. (2018) Authors: Jaswal, Nipun Record Type: Book Extent: 1 online resource (492 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1588. Web security : a whitehat perspective /: a whitehat perspective. ([2015]) Authors: Wu, Hanqing; Zhao, Liz Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1589. Information security policies, procedures, and standards : guidelines for effective information security management /: guidelines for effective information security management. (©2002) Other Names: Peltier, Thomas R Record Type: Book Extent: 1 online resource (xiv, 297 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1590. Hands-On Cryptography with Python : Leverage the power of Python to encrypt and decrypt data /: Leverage the power of Python to encrypt and decrypt data. (2018) Authors: Bowne, Samuel Record Type: Book Extent: 1 online resource (100 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗