761. Mastering Metasploit take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit /: take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit. (2016) Other Names: Jaswal, Nipun Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
762. Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux /: a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux. (2013) Other Names: Muniz, Joseph; Lakhani, Aamir Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
763. Core software security : security at the source /: security at the source. ([2014]) Authors: Ransome, James F; Misra, Anmol; Schoenfield, Brook Other Names: Schmidt, Howard A writer of foreword. Record Type: Book Extent: 1 online resource (xxvi, 388 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
764. Burp suite essentials : discover the secrets of web application pentesting using Burp Suite, the best tool for the job /: discover the secrets of web application pentesting using Burp Suite, the best tool for the job. (2014) Authors: Mahajan, Akash Record Type: Book Extent: 1 online resource (144 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
765. Official (ISC)2 guide to the CSSLP CBK. (©2014) Other Names: Paul, Mano Record Type: Book Extent: 1 online resource (xxlv, 754 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
766. Mastering Metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach /: write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach. (2014) Other Names: Jaswal, Nipun Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
767. Google hacking for penetration testers. Volume 2 / (©2008) Other Names: Long, Johnny Record Type: Book Extent: 1 online resource (xix, 534 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
768. Cyber fraud : tactics, techniques, and procedures /: tactics, techniques, and procedures. (©2009) Other Names: Graham, James (James J.); Howard, Rick Record Type: Book Extent: 1 online resource (xx, 500 pages), illustrations, maps View Content: Available online (eLD content is only available in our Reading Rooms) ↗
769. Unauthorized access : the crisis in online privacy and security /: the crisis in online privacy and security. (2014) Other Names: Sloan, Robert H; Warner, Richard, 1946- Record Type: Book Extent: 1 online resource (xxiii, 354 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
770. Information security fundamentals. ([2014]) Authors: Peltier, Thomas R Record Type: Book Extent: 1 online resource (408 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗