This page contains enriched content visible when JavaScript is enabled.
My Account
Library Home
Your session will expire automatically in
0
seconds.
Continue session
End session now
Return to Browse
Limit/Sort Search
SearchType
Keyword
Title
Author (Last name first)
Subject
ISBN/ISSN
Call Number
Unit Code
Libraries Australia No.
Library of Congress No.
Search
Search Scope
Entire Collection
Print Books
E-books
All books
E-journals
All journals
Databases
All e-resources
Streaming Video
DVDs
Curriculum Resources
Deakin Theses
Special Collections
Melbourne Burwood
Warrnambool
Geelong Waterfront
Geelong Waurn Ponds
Limit search to available items
Add Marked to Bag
Add All On Page
Add Marked to My Lists
Subjects (1-21 of 21)
Computer networks -- Security measures -- Handbooks, manuals, etc
1
2016
Advanced penetration testing for highly-secured environments : employee the most advanced pentesting techniques and tools to build highly-secured systems and environments
Allen, Lee (Information security specialist), author.
Second edition
Birmingham, U.K. : Packt Publishing, 2016
Rating:
Electronic Resources
2
2012
Advanced penetration testing for highly-secured environments : the ultimate security guide : learn to perform professional penetration testing for highly-secured environments with this intensive hands
Allen, Lee (Information security specialist)
Rating:
Electronic Resources
3
2015
The antivirus hacker's handbook
Koret, Joxean, author.
Indianapolis, IN : John Wiley & Sons, Inc., [2015]
Rating:
Electronic Resources
4
2018
The art of hacking : self paced traning kit for cyber security professionals
Santos, Omar, on-screen presenter
[Place of publication not identified] : Pearson, 2018
Rating:
Electronic Resources
5
2005
Black Hat physical device security : exploiting hardware and software
Miller, Drew, 1978-
First edition
Rockland, MA : Syngress ; [Sebastopol, CA] : Distributed by O'Reilly in the United States and Canada, 2005
Rating:
Request It
Location
Call no.
Vol.
Availability
W'PONDS
005.8 Mil/Bhp
AVAILABLE
MELB
005.8 Mil/Bhp
AVAILABLE
6
2005
Cisco network security troubleshooting handbook
Hoda, Mynul
Rating:
Electronic Resources
7
2012
The computer incident response planning handbook : executable plans for protecting information at risk
McCarthy, N. K
Rating:
Electronic Resources
8
2011
Cyber warfare : techniques, tactics and tools for security practitioners
Andress, Jason
Rating:
Electronic Resources
9
2014
Cyber Warfare : Techniques, Tactics and Tools for Security Practitioners
Andress, Jason, author.
Second edition
Waltham, Massachusetts : Syngress, an imprint of Elsevier, 2014
Rating:
Electronic Resources
More...
10
2011
Cyber warfare : techniques, tactics and tools for security practitioners
Andress, Jason.
Rating:
Electronic Resources
11
2009
GFI network security and PCI compliance power tools
Posey, Brien.
Rating:
Electronic Resources
12
2009
Handbook of research on information security and assurance
Hershey, PA : Information Science Reference, [2009]
Rating:
Request It
Location
Call no.
Vol.
Availability
MELB
005.8 Gup/Hor
AVAILABLE
MELB
005.8 Gup/Hor
AVAILABLE
13
2009
Handbook of research on information security and assurance
Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), [2009]
Rating:
14
2009
Handbook of research on information security and assurance
Rating:
Electronic Resources
15
2012
Handbook on securing cyber-physical critical infrastructure
Rating:
Electronic Resources
More...
16
2012
Handbook on Securing Cyber-Physical Critical Infrastructure
Das, Sajal K
Rating:
Electronic Resources
17
2012
Handbook on securing cyber-physical critical infrastructure : foundation and challenges
Rating:
Electronic Resources
18
2006
How to Cheat at Securing a Wireless Network
Hurley, Chris
Rating:
Electronic Resources
19
2019
Human-computer interaction and cybersecurity handbook
Boca Raton, FL : CRC Press, 2019
Rating:
Electronic Resources
20
2015
Information assurance handbook : effective computer security and risk management strategies
Schou, Corey.
Rating:
Electronic Resources
21
2012
Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management
Nordström, Kent
Rating:
Electronic Resources
More...
Add Marked to Bag
Add All On Page
Locate in results
Return to Browse
Limit/Sort Search