1. Beginning ethical hacking with Kali Linux : computational techniques for resolving security issues /: computational techniques for resolving security issues. (2018) Authors: Sinha, Sanjib Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Becoming the hacker : the playbook for getting inside the mind of an attacker /: the playbook for getting inside the mind of an attacker. (2019) Authors: Pruteanu, Adrian Record Type: Book Extent: 1 online resource (405 p.) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Beginning ethical hacking with Python. (2017) Other Names: Sinha, Sanjib Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Python for secret agents : analyze, encrypt, and uncover intelligence data using python, the essential tool for all aspiring secret agents /: analyze, encrypt, and uncover intelligence data using python, the essential tool for all aspiring secret agents. (2014) Authors: Lott, Steven F Other Names: Blaminsky, Jarek cover designer. Record Type: Book Extent: 1 online resource (216 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Reconnaissance for ethical hackers : focusing on starting point of data breaches and essential step for successful penetration testing /: focusing on starting point of data breaches and essential step for successful penetration testing. (2023) Authors: Singh, Glen D Record Type: Book Extent: 1 online resource (395 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Behavioral cybersecurity : fundamental principles and applications of personality psychology /: fundamental principles and applications of personality psychology. (2020) Authors: Patterson, Wayne, 1945-; Winston-Proctor, Cynthia E Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Kompromat : how Russia undermined American democracy /: how Russia undermined American democracy. (2018) Authors: Pegues, Jeff, 1970- Record Type: Book Extent: 1 online resource (287 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. RussiaGate and propaganda : disinformation in the age of social media /: disinformation in the age of social media. (2020) Authors: Boyd-Barrett, Oliver Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Cyber wars : hacks that shocked the business world /: hacks that shocked the business world. (2018) Authors: Arthur, Charles, 1961- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Essential skills for hackers. (2015) Authors: Cardwell, Kevin; Dalziel, Henry Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗