1. Metasploit penetration testing cookbook : over 70 recipes to master the most widely used penetration testing framework /: over 70 recipes to master the most widely used penetration testing framework. (2018) Authors: Singh, Abhinav Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Advanced Infrastructure Penetration Testing : Defend your systems from methodized and proficient attackers /: Defend your systems from methodized and proficient attackers. (2018) Authors: Chebbi, Chiheb Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux /: a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux. (2018) Other Names: Muniz, Joseph; Lakhani, Aamir Record Type: Book Extent: 1 online resource (426 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. PfSense 2.x Cookbook : Manage and maintain your network using pfSense, 2nd Edition /: Manage and maintain your network using pfSense, 2nd Edition. (2018) Authors: Zientara, David Record Type: Book Extent: 1 online resource (298 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Learning Python for Forensics : Leverage the power of Python in forensic investigations, 2nd Edition /: Leverage the power of Python in forensic investigations, 2nd Edition. (2019) Authors: Miller, Preston; Bryce, Chapin Record Type: Book Extent: 1 online resource (476 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Python Network Programming : Conquer all your networking challenges with the powerful Python language /: Conquer all your networking challenges with the powerful Python language. (2019) Authors: Ratan, Abhishek; Chou, Eric; Kathiravelu, Pradeeban; Dr, Sarker, M. O. Faruque Record Type: Book Extent: 1 online resource (776 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Bug Bounty Hunting Essentials : Quick-paced guide to help white-hat hackers get through bug bounty programs /: Quick-paced guide to help white-hat hackers get through bug bounty programs. (2018) Authors: Lozano, Carlos A; Amir, Shahmeer Record Type: Book Extent: 1 online resource (270 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Mastering Python for networking and security leverage Python scripts and libraries to overcome networking and security issues.: leverage Python scripts and libraries to overcome networking and security issues. (2018) Other Names: Ortega, José Manuel Record Type: Book Extent: 1 online resource (415 p.) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Network Scanning Cookbook : Practical network security using Nmap and Nessus 7 /: Practical network security using Nmap and Nessus 7. (2018) Authors: Jetty, Sairam Record Type: Book Extent: 1 online resource (304 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Kali Linux 2018 : Assuring Security by Penetration Testing : Unleash the full potential of Kali Linux 2018, now with updated tools, 4th Edition /: Assuring Security by Penetration Testing : Unleash the full potential of Kali Linux 2018, now with updated tools, 4th Edition. (2018) Authors: V. N Parasram, Shiva; Samm, Alex; Boodoo, Damian; Johansen, Gerard; Allen, Lee; Heriyanto, Tedi; Ali, Shakeel Record Type: Book Extent: 1 online resource (528 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗