Limit search to available items
Result Page   
Add Marked to Bag Add All On Page Add Marked to My Lists
Subjects (1-50 of 65)
Computer networks -- Access control.
2
E-book
2018

Advanced monitoring in P2P botnets : a dual perspective


Karuppayah, Shankar, author

Singapore : Springer, [2018]

Rating:

 
10
E-book
2011

Advances in computing, communication and control : international conference, ICAC3 2011, Mumbai, India, January 28-29, 2011, proceedings


International Conference on Advances in Computing, Communication, and Control (2011 : Mumbai, India)



Rating:

 
11
E-book
2013

Advances in computing, communication, and control : third International Conference, ICAC3 2013, Mumbai, India, January 18-19, 2013. Proceedings


International Conference on Advances in Computing, Communication, and Control (3rd : 2013 : Mumbai, India)



Rating:

 
12
E-book
2009

Advances in cryptology - ASIACRYPT 2009 : 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 : proceedings


International Conference on the Theory and Application of Cryptology and Information Security (15th : 2009 : Tokyo, Japan)



Rating:

 
16
E-book
2017

Advances in user authentication


Dasgupta, D. (Dipankar), 1958- author

Cham : Springer, [2017]

Rating:

 
19
Streaming video
2019

All Hail The Algorithm : Like Me: The Popularity & Power Of Big Tech




Australia : Al Jazeera English [broadcaster], 2019 August 27 at 08:30:00

Rating:

 
 
20
E-book
2015

The antivirus hacker's handbook


Koret, Joxean, author.

Indianapolis, IN : John Wiley & Sons, Inc., [2015]

Rating:

 
24
Streaming audio
2023

The art of cyber security : a practical guide to winning the war on cyber crime


Hibberd, Gary, author.
[First edition]
[Place of publication not identified] : IT Governance Publishing, 2023

Rating:

 
25
26
27
30
E-book
2015

Beyond cybersecurity : protecting your digital business




Hoboken, New Jersey : John Wiley & Sons, Inc., 2015

Rating:

 
32
E-book
2018

Big data analytics with applications in insider threat detection


Thuraisingham, Bhavani M., author

Boca Raton, FL : CRC Press, [2018]

Rating:

 
35
E-book
2014

Break-glass : handling exceptional situations in access control


Petritsch, Helmut, author

Wiesbaden : Springer Vieweg, 2014

Rating:

 
37
E-book
2014

The Browser Hacker's Handbook


Alcorn, Wade.

©2014

Rating:

 
38
E-book
2018

Building a modern security program : adapting security for DevOps and cloud


Lackey, Zane, author.
First edition
Sebastopol, CA : O'Reilly Media, [2018]

Rating:

 
39
E-book
2003

Building DMZs for Enterprise networks


Shimonski, Robert

©2003

Rating:

 
41
E-book
2006

Certification study guide.


Bücker, Axel
1st ed


Rating:

 
42
Streaming video
2024

Certified incident handler (ECIH) v2



[First edition]
[Place of publication not identified] : Packt Publishing, 2024

Rating:

 
44
Book
2001

Cisco IOS access lists


Sedayao, Jeff.

Sebastopol, CA : O'Reilly & Associates, [2001]

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  004.68 Ios Sed/Cia  AVAILABLE
45
E-book
2001

Cisco IOS access lists


Sedayao, Jeff.



Rating:

 
46
E-book
2017

Cisco ISE for BYOD and secure unified access


Woland, Aaron T., author.
Second edition
Indianapolis, Indiana : Cisco Press, [2017]

Rating:

 
48
E-book
2012

Client-side attacks and defense


Oriyano, Sean-Philip.



Rating:

 
49
E-book
2012

Client-side attacks and defense


Shimonski, Robert



Rating:

 
50
E-book
2019

The complete Metasploit guide : explore effective penetration testing techniques with Metasploit


Rahalkar, Sagar, author

Birmingham, UK : Packt Publishing, 2019

Rating:

 
Add Marked to Bag Add All On Page
Locate in results
Result Page