1. Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools /: make the most of the Bash shell and Kali Linux's command-line-based security assessment tools. (2014) Other Names: Makan, Keith Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Microsoft log parser toolkit. (2005) Other Names: Giuseppini, Gabriele; Burnett, Mark Record Type: Book Extent: 1 online resource (350 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗