81. Kali Linux - Windows penetration testing. (2016) Authors: Halton, Wolf; Weaver, Bo Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
82. Ethical hacking workshop : explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity /: explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity. (2023) Authors: Pillay, Rishalin; Abutheraa, Mohammed Record Type: Book Extent: 1 online resource (287 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
83. Ethical hacking and penetration testing guide. (2014) Authors: Baloch, Rafay Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
84. Coding for penetration testers : building better tools /: building better tools. (2016) Authors: Andress, Jason; Linn, Ryan Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
85. Penetration tester's open source toolkit. (2015) Authors: Faircloth, Jeremy Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
86. Windows and Linux penetration testing from scratch : harness the power of pentesting with Kali Linux for unbeatable hard-hitting results /: harness the power of pentesting with Kali Linux for unbeatable hard-hitting results. (2022) Authors: Bramwell, Phil Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
87. Zed attack proxy cookbook : hacking tactics, techniques, and procedures for testing web applications and APIs using OWASP ZAP /: hacking tactics, techniques, and procedures for testing web applications and APIs using OWASP ZAP. (2023) Authors: Soper, Ryan; Torres, Nèstor; Almoailu, Ahmed Record Type: Book Extent: 1 online resource (392 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
88. AWS Penetration Testing : Implement Various Security Strategies on AWS Using Tools Such As Kali Linux, Metasploit, and Nmap.: Implement Various Security Strategies on AWS Using Tools Such As Kali Linux, Metasploit, and Nmap. (2020) Other Names: Helmus, Jonathan Record Type: Book Extent: 1 online resource (330 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
89. Backtrack 5 wireless penetration testing : beginner's guide /: beginner's guide. (2011) Other Names: Ramachandran, Vivek Record Type: Book Extent: 1 online resource (220 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
90. Building virtual pentesting labs for advanced penetration testing. (2016) Authors: Cardwell, Kevin Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗