|
21.
|
Web application vunerabilities : detect, exploit, prevent
by Cross, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress Publishing, 2007Availability: Items available for loan: [Call number: 005.8 CRO] (2).
|
|
22.
|
Web application obfuscation
by Heiderich, Mario. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 HEI] (1).
|
|
23.
|
Securing Web services : practical usage of standards and specifications
by Periorellis, Panos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Reference, 2008Availability: Items available for loan: [Call number: 005.8 PER] (1).
|
|
24.
|
Security engineering for service-oriented architectures
by Hafner, Michael | Breu, Ruth. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 004.22 HAF] (1).
|
|
25.
|
Complete Guide to Internet Security
by Merkow, Mark S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: American Management Association, 2000Availability: Items available for loan: [Call number: 005.8 MER] (1).
|
|
26.
|
DNS security management
by Dooley, Michael | Rooney, Timothy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: John Wiley and Sons, 2017Availability: Items available for loan: [Call number: 005.8 DOO] (1).
|
|
27.
|
Huawei and snowden questions
by Lysne, Olav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland Springer 2018Availability: Items available for loan: [Call number: 005.8 LYS] (1).
|
|
28.
|
A guide to kernel exploitation : attacking the core
by Perla, Enrico | Massimiliano, Oldani. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington, MA : Syngress, 2010Availability: Items available for loan: [Call number: 005.8 PER] (1).
|
|
29.
|
Fraud prevention in online digital advertising
by Zhu, Xingquan | Tao, Haicheng | Wu, Zhiang | Cao, Jie | Kalish, Kristopher | Kayne, Jeremy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 364.163 ZHU] (1).
|
|
30.
|
Anomaly detection principles and algorithms
by Mehrotra, Kishan G | Mohan, Chilukuri K | Huang, Huaming. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: No items available Checked out (1).
|
|
31.
|
DNS security : defending the Domain Name System
by Liska, Allan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2016Availability: Items available for loan: [Call number: 005.8 LIS] (1).
|
|
32.
|
How to attack and defend your website
by Dalziel, Henry. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 005.8 DAL] (1).
|
|
33.
|
Blockchain for distributed systems security
by Shetty, Sachin S. Publisher: Hoboken Wiley 2019Availability: Items available for loan: [Call number: 005.74 SHE] (1).
|
|
34.
|
Practical IoT hacking : the definitive guide to attacking the internet of things
by Chantzis, Fotios | Stais, Ioannis | Calderon, Paulino | Deirmentzoglou, Evangelos | Woods, Beau. Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.87 CHA] (1).
|
|
35.
|
Ethical and secure computing : a concise module
by Kizza, Joseph Migga. Edition: 3rd ed. Publisher: Cham : Springer, 2023Availability: Items available for loan: [Call number: 005.8 KIZ] (1).
|
|
36.
|
If it's smart, it's vulnerable
by Hypponen, Mikko. Publisher: Hoboken : Wiley, 2022Availability: Items available for loan: [Call number: 005.8 HYP] (1).
|