11. Kali Linux 2018 : Assuring Security by Penetration Testing : Unleash the full potential of Kali Linux 2018, now with updated tools, 4th Edition /: Assuring Security by Penetration Testing : Unleash the full potential of Kali Linux 2018, now with updated tools, 4th Edition. (2018) Authors: V. N Parasram, Shiva; Samm, Alex; Boodoo, Damian; Johansen, Gerard; Allen, Lee; Heriyanto, Tedi; Ali, Shakeel Record Type: Book Extent: 1 online resource (528 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
12. The Weakest Link : Why Your Employees Might Be Your Biggest Cyber Risk /: Why Your Employees Might Be Your Biggest Cyber Risk. (2016 copyright 2016) Authors: Mr, Swinfen Green, Jeremy; Professor, Dorey, Paul Record Type: Book Extent: 1 online resource (240 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
13. Learn pfSense 2.4 : Get up and running with Pfsense and all the core concepts to build firewall and routing solutions /: Get up and running with Pfsense and all the core concepts to build firewall and routing solutions. (2018) Authors: Zientara, David Record Type: Book Extent: 1 online resource (346 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
14. Hands-On Security in DevOps : Ensure continuous security, deployment, and delivery with DevSecOps /: Ensure continuous security, deployment, and delivery with DevSecOps. (2018) Authors: Hsu, Tony Record Type: Book Extent: 1 online resource (356 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
15. Practical Industrial Internet of Things Security : A practitioner's guide to securing connected industries /: A practitioner's guide to securing connected industries. (2018) Authors: Bhattacharjee, Sravani Record Type: Book Extent: 1 online resource (324 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
16. Hands-On Penetration Testing on Windows : Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis /: Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis. (2018) Authors: Bramwell, Phil Record Type: Book Extent: 1 online resource (452 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
17. Burp suite cookbook : practical recipes to help you master web penetration testing with Burp suite.: practical recipes to help you master web penetration testing with Burp suite. (2018) Other Names: Wear, Sunny Record Type: Book Extent: 1 online resource (350 p.) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
18. User-Centred and Context-Aware Identity Management in Mobile Ad-Hoc Networks. (2013) Other Names: Arabo, Abdullahi Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
19. Incident Response in the Age of Cloud : Techniques and best practices to effectively respond to cybersecurity incidents /: Techniques and best practices to effectively respond to cybersecurity incidents. (2021) Authors: Ozkaya, Erdal Record Type: Book Extent: 1 online resource (622 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
20. Security and Trust Management : 16th International Workshop, STM 2020, Guildford, UK, September 17–18, 2020, Proceedings /: 16th International Workshop, STM 2020, Guildford, UK, September 17–18, 2020, Proceedings. (2020) Editors: Markantonakis, Kostantinos; Petrocchi, Marinella Record Type: Book Extent: 1 online resource (139 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗