1591. Wireshark 2 Quick Start Guide : Secure your network through protocol analysis /: Secure your network through protocol analysis. (2018) Authors: Mishra, Charit Record Type: Book Extent: 1 online resource (164 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1592. Learning Python Web Penetration Testing : Automate web penetration testing activities using Python /: Automate web penetration testing activities using Python. (2018) Authors: Martorella, Christian Record Type: Book Extent: 1 online resource (138 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1593. Hands-On Cybersecurity with Blockchain : Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain /: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain. (2018) Authors: Gupta, Rajneesh Record Type: Book Extent: 1 online resource (236 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1594. Mastering Machine Learning for Penetration Testing : Develop an extensive skill set to break self-learning systems using Python /: Develop an extensive skill set to break self-learning systems using Python. (2018) Authors: Chebbi, Chiheb Record Type: Book Extent: 1 online resource (276 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1595. Learning malware analysis. (2017) Authors: K. A., Monnappa Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1596. Hardware Security. (2014) Other Names: Mukhopadhyay, Debdeep Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1597. Advanced Hybrid Information Processing : Third EAI International Conference, ADHIP 2019, Nanjing, China, September 21–22, 2019, Proceedings, Part I /: Third EAI International Conference, ADHIP 2019, Nanjing, China, September 21–22, 2019, Proceedings, Part I. (2019) Editors: Gui, Guan; Yun, Lin Record Type: Book Extent: 1 online resource (518 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1598. Security controls evaluation, testing, and assessment handbook. (2019) Authors: Johnson, Leighton Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1599. Cybersecurity analytics. (2019) Authors: Verma, Rakesh M; Marchette, David J Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1600. IT-Sicherheitsmanagement nach der neuen ISO 27001 : ISMS, Risiken, Kennziffern, Controls /: ISMS, Risiken, Kennziffern, Controls. (2019) Authors: Kersten, Heinrich; Klett, Gerhard; Reuter, Jürgen; Schröder, Klaus-Werner Record Type: Book Extent: 1 online resource (272 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗