Search Results - Muniz, Joseph
- Showing 1 - 8 results of 8
-
1
Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux... by Muniz, Joseph
Published 2013Call Number: Loading…Full Text (via ProQuest)
Located: Loading…
eBook -
2
Penetration testing with Raspberry Pi : construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi / by Muniz, Joseph
Published 2015Call Number: Loading…Full Text (via O'Reilly/Safari)
Located: Loading…
eBook -
3
Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux... by Muniz, Joseph
Published 2013Call Number: Loading…Full Text (via O'Reilly/Safari)
Located: Loading…
eBook -
4
The Modern Security Operations Center / by Muniz, Joseph, Lakhani, Aamir
Published 2021Call Number: Loading…Full Text (via O'Reilly/Safari)
Located: Loading…
eBook -
5
Investigating the Cyber Breach : the digital forensics guide for the network engineer / by Muniz, Joseph, Lakhani, Aamir
Published 2018Call Number: Loading…Full Text (via O'Reilly/Safari)
Located: Loading…
eBook -
6
CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide / by Muniz, Joseph, Chimes, Steven, Risler, James
Published 2021Call Number: Loading…Full Text (via O'Reilly/Safari)
Located: Loading…
eBook -
7
CCNA Cyber Ops SECFND 210-250 official cert guide / by Santos, Omar, Muniz, Joseph, De Crescenzo, Stefano
Published 2017Call Number: Loading…Full Text (via O'Reilly/Safari)
Located: Loading…
eBook -
8
CompTIA Cybersecurity Analyst CSA+ (CS0-001) : complete video course /
Published 2017Other Authors: “…Muniz, Joseph…”
Call Number: Loading…Streaming Video (via O'Reilly/Safari)
Located: Loading…
Electronic Video
Search Tools:
RSS Feed
–
Save Search
Related Subjects
Computer networks
Security measures
Computer security
Examinations
Access control
Certification
Computers
Evaluation
Testing
Web sites
Computer crimes
Computer technicians
Data protection
Electronic data processing personnel
Information technology
Management
Penetration testing (Computer security)
Prevention
Raspberry Pi (Computer)