751. Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning /: over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning. (2014) Other Names: Hutchens, Justin Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
752. Digital watermarking and steganography : fundamentals and techniques /: fundamentals and techniques. (2017) Authors: Shih, Frank Y Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
753. Introduction to cryptography with open-source software. (©2011) Other Names: McAndrew, Alasdair Record Type: Book Extent: 1 online resource (xix, 433 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
754. The complete guide to physical security. (2013) Other Names: Baker, Paul R, 1958-; Benny, Daniel J Record Type: Book Extent: 1 online resource (xxi, 339 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
755. Assessing and managing security risk in IT systems : a structured methodology /: a structured methodology. (2005) Other Names: McCumber, John, 1956- Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
756. Information security risk analysis. (©2001) Other Names: Peltier, Thomas R Record Type: Book Extent: 1 online resource (xi, 281 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
757. Audit and trace log management : consolidation and analysis /: consolidation and analysis. (2006) Other Names: Maier, Phillip Q Record Type: Book Extent: 1 online resource (xiii, 171 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
758. Software deployment, updating, and patching. (©2008) Other Names: Stackpole, Bill; Hanrion, Patrick Record Type: Book Extent: 1 online resource (xx, 397 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
759. Oracle Identity and Access Manager 11g for administrators : administer Oracle Identity and Access Management : installation, configuration, and day-to-day tasks /: administer Oracle Identity and Access Management : installation, configuration, and day-to-day tasks. (©2011) Other Names: Kumar, Atul Record Type: Book Extent: 1 online resource (viii, 315 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
760. Cyberphobia : identity, trust, security and the Internet /: identity, trust, security and the Internet. ([2015]) Authors: Lucas, Edward, 1962- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗