1. A multidisciplinary introduction to information security. (2011) Other Names: Mjølsnes, Stig F Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Metasploit penetration testing cookbook : over 70 recipes to master the most widely used penetration testing framework /: over 70 recipes to master the most widely used penetration testing framework. (2018) Authors: Singh, Abhinav Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux /: a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux. (2018) Other Names: Muniz, Joseph; Lakhani, Aamir Record Type: Book Extent: 1 online resource (426 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Securing the perimeter : deploying identity and access management with free open source software /: deploying identity and access management with free open source software. ([2018]) Authors: Schwartz, Michael Other Names: Machulak, M. P (Maciej P.) Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Becoming the hacker : the playbook for getting inside the mind of an attacker /: the playbook for getting inside the mind of an attacker. (2019) Authors: Pruteanu, Adrian Record Type: Book Extent: 1 online resource (405 p.) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Information systems security : 11th international conference, ICISS 2015, Kolkata, India, December 16-20, 2015, proceedings /: 11th international conference, ICISS 2015, Kolkata, India, December 16-20, 2015, proceedings. (2015) Editors: Jajodia, Sushil; Mazumdar, Chandan Other Names: ICISS (Conference), 11th Record Type: Book Extent: 1 online resource (xvi, 584 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Advances in user authentication. ([2017]) Authors: Dasgupta, D (Dipankar), 1958-; Roy, Arunava; Nag, Abhijit Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Integrating a usable security protocol into user authentication services design process. (2018) Authors: Seffah, Ahmed; Braz, Christina; Naqvi, Syed Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Security in computing and communications : third international symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings /: third international symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings. (2015) Editors: Abawajy, Jemal H, 1982-; Mukherjea, Sougata; Thampi, Sabu M; Martinez, Antonio Ruiz, 1976- Other Names: SSCC (Conference), 3rd Record Type: Book Extent: 1 online resource (xxi, 548 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Git essentials : create, merge, and distribute code with Git, the most powerful and flexible versioning system available /: create, merge, and distribute code with Git, the most powerful and flexible versioning system available. (2017) Authors: Santacroce, Ferdinando Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗