21. Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks

by Brancik, Kenneth C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2008Availability: Items available for loan: [Call number: 005.8 BRA] (1).
22. Malicious bots : an inside look into the cyber-criminal underground of the internet

by Dunham, Ken | Melnick, Jim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 364.168 DUN] (1).
23. Hackers

by Levy, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly, 2010Availability: Items available for loan: [Call number: 005.80922 LEV] (1).
24. Phishing exposed

by James, Lance.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress Publishing, 2005Availability: Items available for loan: [Call number: 005.8 JAM] (1).
25. Penetration testing essentials

by Oriyano, Sean-Philip.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana Sybex: Wiley, 2016Availability: Items available for loan: [Call number: 005.8 ORI] (1).
26. How cybersecurity really works : a hands-on guide for total beginners

by Grubb, Sam.

Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.8 GRU] (1).
27. Ethical and secure computing : a concise module

by Kizza, Joseph Migga.

Edition: 3rd ed. Publisher: Cham : Springer, 2023Availability: Items available for loan: [Call number: 005.8 KIZ] (1).

Powered by Koha