21. Web application vunerabilities : detect, exploit, prevent

by Cross, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress Publishing, 2007Availability: Items available for loan: [Call number: 005.8 CRO] (2).
22. Web application obfuscation

by Heiderich, Mario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 HEI] (1).
23. Securing Web services : practical usage of standards and specifications

by Periorellis, Panos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Information Science Reference, 2008Availability: Items available for loan: [Call number: 005.8 PER] (1).
24. Security engineering for service-oriented architectures

by Hafner, Michael | Breu, Ruth.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 004.22 HAF] (1).
25. Complete Guide to Internet Security

by Merkow, Mark S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: American Management Association, 2000Availability: Items available for loan: [Call number: 005.8 MER] (1).
26. DNS security management

by Dooley, Michael | Rooney, Timothy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley and Sons, 2017Availability: Items available for loan: [Call number: 005.8 DOO] (1).
27. Huawei and snowden questions

by Lysne, Olav.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland Springer 2018Availability: Items available for loan: [Call number: 005.8 LYS] (1).
28. A guide to kernel exploitation : attacking the core

by Perla, Enrico | Massimiliano, Oldani.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington, MA : Syngress, 2010Availability: Items available for loan: [Call number: 005.8 PER] (1).
29. Fraud prevention in online digital advertising

by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).
30. Anomaly detection principles and algorithms

by Mehrotra, Kishan G | Mohan, Chilukuri K | Huang, Huaming.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Availability: No items available Checked out (1).
31. DNS security : defending the Domain Name System

by Liska, Allan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2016Availability: Items available for loan: [Call number: 005.8 LIS] (1).
32. How to attack and defend your website

by Dalziel, Henry.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 005.8 DAL] (1).
33. Blockchain for distributed systems security

by Shetty, Sachin S.

Publisher: Hoboken Wiley 2019Availability: Items available for loan: [Call number: 005.74 SHE] (1).
34. Practical IoT hacking : the definitive guide to attacking the internet of things

by Chantzis, Fotios | Stais, Ioannis | Calderon, Paulino | Deirmentzoglou, Evangelos | Woods, Beau.

Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.87 CHA] (1).
35. Ethical and secure computing : a concise module

by Kizza, Joseph Migga.

Edition: 3rd ed. Publisher: Cham : Springer, 2023Availability: Items available for loan: [Call number: 005.8 KIZ] (1).
36. If it's smart, it's vulnerable

by Hypponen, Mikko.

Publisher: Hoboken : Wiley, 2022Availability: Items available for loan: [Call number: 005.8 HYP] (1).

Powered by Koha