|
21.
|
Network intrusion alert : an ethical hacking guide to intrusion detection
by Fadia, Ankit | Zacharia, Manu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Thomson Course Technology, 2008Availability: Items available for loan: [Call number: 005.8 FAD] (1).
|
|
22.
|
Software hacking
by Fadia, Ankit | Patnaik, Nishant Das. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Vikas Publishing House, 2010Availability: Items available for loan: [Call number: 005.8 FAD] (1).
|
|
23.
|
Hackers delight
by Warren, Henry S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson, 2012Availability: Items available for loan: [Call number: 005.8 WAR] (1).
|
|
24.
|
Code hacking : a developer's guide to network security
by Cordingley, Julian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 CON] (2).
|
|
25.
|
Hacker's handbook : the strategy behind breaking into and defending networks
by Susan Young | Aitel, Dav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Roca Raton: CRC Press, 2003Availability: Items available for loan: [Call number: 005.8 SUS] (1).
|
|
26.
|
Penetration testing essentials
by Oriyano, Sean-Philip. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana Sybex: Wiley, 2016Availability: Items available for loan: [Call number: 005.8 ORI] (1).
|
|
27.
|
Girl who takes an eye for an eye
by Lagercrantz, David | Goulding. George. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Maclehose Press, 2017Availability: Items available for loan: [Call number: 839.738 LAG] (1).
|
|
28.
|
Phishing dark waters : the offensive and defensive sides of malicious emails
by Hadnagy, Christopher | Fincher, Michele. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley, 2015Availability: Items available for loan: [Call number: 364.1632 HAD] (1).
|
|
29.
|
Exploring malicious hacker communities : toward proactive cyber defence
by Marin, Ericsson | Almukaynizi, Mohammed | Sarkar, Soumajyoti | Nunes, Eric | Shakarian, Jana | Shakarian, Paulo. Publisher: Cambridge : Cambridge University Press, 2021Availability: Items available for loan: [Call number: 363.325 MAR] (1).
|
|
30.
|
Cybersecurity : the insights you need from Harvard Business Review
by Harvard Business Review. Publisher: Boston : Harvard Business Review Press, 2019Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
31.
|
Artificial unintelligence : how computers misunderstand the world
by Broussard, Meredith. Publisher: Cambridge : MIT Press, 2019Availability: Items available for loan: [Call number: 303.4834 BRO] (1).
|