Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Book
|
![]() |
Network Protocols for Security Professionals: Probe and Identify Network-Based Vulnerabilities and Safeguard Against Network Protocol BreachesEISBN: 9781789954036 ;EISBN: 1789954037 ;OCLC: 1348482262Full text available |
2 |
Material Type: Book
|
![]() |
OPNsense Beginner to Professional: Protect Networks and Build Next-Generation Firewalls Easily with OPNsenseEISBN: 1801814058 ;EISBN: 9781801814058 ;OCLC: 1321802387Full text available |
3 |
Material Type: Book
|
![]() |
Mastering Kali Linux for Advanced Penetration Testing : Become a Cybersecurity Ethical Hacking Expert Using Metasploit, Nmap, Wireshark, and Burp SuiteEISBN: 1801812675 ;EISBN: 9781801812672Full text available |
4 |
Material Type: Book
|
![]() |
Diving into Secure Access Service Edge: A Technical Leadership Guide to Achieving Success with SASE at Market SpeedEISBN: 1803237538 ;EISBN: 9781803237534 ;OCLC: 1351472231Full text available |
5 |
Material Type: Book
|
![]() |
Pentesting Industrial Control Systems: An Ethical Hacker's Guide to Analyzing, Compromising, Mitigating, and Securing Industrial ProcessesISBN: 9781800202382 ;ISBN: 1800202385 ;EISBN: 180020728X ;EISBN: 9781800207288 ;OCLC: 1285171069Full text available |
6 |
Material Type: Book
|
![]() |
Learn Social Engineering: Learn the Art of Human Hacking with an Internationally Renowned ExpertISBN: 1788837924 ;ISBN: 9781788837927 ;EISBN: 9781788838009 ;EISBN: 1788838009 ;OCLC: 1035515708Full text available |
7 |
Material Type: Book
|
![]() |
Network Vulnerability Assessment: Identify Security Loopholes in Your Network's InfrastructureISBN: 1788627253 ;ISBN: 9781788627252 ;EISBN: 9781788624725 ;EISBN: 1788624726 ;OCLC: 1053824137Full text available |
8 |
Material Type: Book
|
![]() |
Network Security with PfSense: Architect, Deploy, and Operate Enterprise-Grade FirewallsISBN: 9781789532975 ;ISBN: 1789532973 ;EISBN: 1789538610 ;EISBN: 9781789538618 ;OCLC: 1050953429Full text available |
9 |
Material Type: Book
|
![]() |
Cybersecurity - attack and defense strategies: infrastructure security with red team and blue team tacticsISBN: 1788475291 ;ISBN: 9781788475297 ;ISBN: 178847385X ;ISBN: 9781788473859 ;EISBN: 178847385X ;EISBN: 9781788473859 ;OCLC: 1022788021 ;LCCallNum: QA76.9.A25Full text available |
10 |
Material Type: Book
|
![]() |
Hands-On Red Team Tactics: A practical guide to mastering Red Team operationsISBN: 9781788997003 ;ISBN: 178899700X ;ISBN: 9781788995238 ;ISBN: 1788995236 ;EISBN: 9781788997003 ;EISBN: 178899700X ;OCLC: 1056875822Full text available |
11 |
Material Type: Book
|
![]() |
Penetration Testing Azure for Ethical Hackers: Develop Practical Skills to Perform Pentesting and Risk Assessment of Microsoft Azure EnvironmentsISBN: 9781839212932 ;ISBN: 1839212934 ;EISBN: 1839214708 ;EISBN: 9781839214707 ;OCLC: 1273974506Full text available |
12 |
Material Type: Book
|
![]() |
Ansible Quick Start Guide: Control and monitor infrastructures of any size, physical or virtualISBN: 1789538734 ;ISBN: 9781789538731 ;ISBN: 9781789532937 ;ISBN: 1789532930 ;EISBN: 1789538734 ;EISBN: 9781789538731 ;OCLC: 1056896081Full text available |
13 |
Material Type: Book
|
![]() |
Hands on HackingISBN: 1119561450 ;ISBN: 9781119561453 ;EISBN: 1119561485 ;EISBN: 9781119561484 ;DOI: 10.1002/9781119561507Full text available |
14 |
Material Type: Book
|
![]() |
Zabbix 4 Network Monitoring: Monitor the Performance of Your Network Devices and Applications Using the All-New Zabbix 4. 0, 3rd EditionISBN: 9781789340266 ;ISBN: 1789340268 ;EISBN: 9781789345247 ;EISBN: 1789345243 ;OCLC: 1084360516Full text available |
15 |
Material Type: Book
|
![]() |
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost ToolsISBN: 9780128036013 ;ISBN: 012803601X ;ISBN: 9780128035849 ;ISBN: 0128035846 ;EISBN: 9780128036013 ;EISBN: 012803601X ;DOI: 10.1016/C2015-0-00218-0 ;OCLC: 944961028 ;LCCallNum: TK5105.59 .C493 2016Full text available |
16 |
Material Type: Book
|
![]() |
Mastering Active Directory: Design, Deploy, and Protect Active Directory Domain Services for Windows Server 2022ISBN: 1801070393 ;ISBN: 9781801070393 ;EISBN: 9781801073752 ;EISBN: 1801073759 ;OCLC: 1290021858Full text available |
17 |
Material Type: Book
|
![]() |
Cyber Warfare - Truth, Tactics, and Strategies: Strategic Concepts and Truths to Help You and Your Organization Survive on the Battleground of Cyber WarfareISBN: 9781839216992 ;ISBN: 1839216999 ;EISBN: 9781839214486 ;EISBN: 1839214481 ;OCLC: 1143627127Full text available |
18 |
Material Type: Book
|
![]() |
Hands-On Network Forensics: Investigate Network Attacks and Find Evidence Using Common Network Forensic ToolsISBN: 9781789344523 ;ISBN: 1789344522 ;EISBN: 9781789341058 ;EISBN: 1789341051 ;OCLC: 1096516059Full text available |
19 |
Material Type: Book
|
![]() |
Malware Diffusion Models for Modern Complex Networks: Theory and ApplicationsISBN: 0128027142 ;ISBN: 9780128027141 ;ISBN: 9780128027165 ;ISBN: 0128027169 ;EISBN: 9780128027165 ;EISBN: 0128027169 ;DOI: 10.1016/C2014-0-02168-5 ;OCLC: 945135908 ;LCCallNum: QA76.9.A25 .K37 2016Full text available |
20 |
Material Type: Book
|
![]() |
NET Standard 2.0 Cookbook: Develop high quality, fast and portable applications by leveraging the power of .NET Standard LibraryISBN: 9781788838726 ;ISBN: 1788838726 ;EISBN: 9781788838726 ;EISBN: 1788838726Full text available |