Call Number (LC) | Title | Results |
---|---|---|
TK5105.59 O675 2016 | SSL and TLS. | 1 |
TK5105.59 .O73 2004eb |
Ethereal : packet sniffing / Ethereal packet sniffing / |
3 |
TK5105.59 .O73 2007eb | Wireshark & Ethereal network protocol analyzer toolkit, Jay Beale's open source security series / | 1 |
TK5105.59 .O74 2005 | Snort cookbook | 1 |
TK5105.59 .O77 1996 | Authentication systems for secure networks / | 1 |
TK5105.59 .O78 2008eb |
Nmap in the enterprise : your guide to network scanning / Nmap in the enterprise your guide to network scanning / |
3 |
TK5105.59 .O786 2014eb | Hacker techniques, tools, and incident handling, second edition / | 1 |
TK5105.59 .O85 2002eb |
Cisco security specialist's guide to PIX firewalls Cisco security specialist's guide to PIX firewalls / |
3 |
TK5105.59 .O9 2012 | Quantitative security risk assessment of enterprise networks | 1 |
TK5105.59 .O95 2013 |
Security risks in social media technologies safe practices in public service applications / Security risks in social media technologies : safe practices in public service applications / |
3 |
TK5105.59 .O953 2018eb | Learn Social Engineering : Learn the art of human hacking with an internationally renowned expert. | 1 |
TK5105.59 .O953 2022 | Practical Cyber Threat Intelligence | 1 |
TK5105.59 .O97 2020eb | Distributed denial of service attacks : real-world detection and mitigation / | 1 |
TK5105.59 .P33 1996 | Internet and TCP/IP network security : securing protocols and applications / | 1 |
TK5105.59 .P35 2012 | Nmap 6 : network exploration and security auditing Cookbook / | 2 |
TK5105.59 .P37 2005 | The business case for network security : advocacy, governance, and ROI / | 1 |
TK5105.59 .P375 2009 | Implementing Cisco IOS network security (IINS) / | 1 |
TK5105.59 .P375 2012 | Implementing Cisco IOS Network Security (IINS 640-554) : foundation learning guide / | 1 |
TK5105.59 .P384 2012 | Kerberos : Single Sign-on in gemischten Linux/Windows-Umgebungen. | 1 |
TK5105.59 .P385 2013 | The basics of web hacking : tools and techniques to attack the web / | 1 |