gogogo

Your search returned 71 results.

Sort
Results
CEH certified ethical hacker study guide : version 9 / Sean-Philip Oriyano. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Indiana : Sybex, a Wiley brand, 2016
Other title:
  • CEH v9 : certified ethical hacker version 9 study guide
  • Certified ethical hacker version nine study guide
Availability: Items available for loan: Moylish Library (1)Location, call number: Main Collection 005.8 ORI.
Data and Goliath : the hidden battles to collect your data and control your world / Bruce Schneier. by
Edition: First edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, N.Y. : W.W. Norton & Company, [2015]
Availability: Items available for loan: Clonmel Library (1)Location, call number: Main Collection 005.85 SCH.
Modern cryptography : applied mathematics for encryption and information security / Chuck Easttom. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : McGraw-Hill Education, 2015
Availability: Items available for loan: Moylish Library (1)Location, call number: Main Collection 005.82 EAS.
Computer Security: Art and Science by
Material type: Text Text; Format: print
Publication details: Addison-Wiley
Availability: Items available for loan: Thurles Library (1)Location, call number: Main Collection 005.8 BIS.
Malware forensics field guide for Windows systems : digital forensics field guides / Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham, MA : Syngress, c2012
Availability: Items available for loan: Moylish Library (1)Location, call number: Main Collection 005.8 MAL.
Cyber attacks [electronic book] : protecting national infrastructure / Edward Amoroso. by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Burlington, MA : Butterworth-Heinemann, c2011
Online access:
Availability: No items available.
Securing SQL server [electronic book] : protecting your database from attackers / Denny Cherry. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington, MA : Syngress, 2011
Online access:
Availability: No items available.
Windows registry forensics [electronic book] : advanced digital forensic analysis of the Windows registry / Harlan Carvey. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington, MA : Syngress, 2011
Online access:
Availability: No items available.
Securing the cloud [electronic book] : cloud computer security techniques and tactics / J.R. "Vic" Winkler. by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Burlington, MA : Elsevier, 2011
Online access:
Availability: No items available.
Internet security threats and solutions. [thesis] / Ronan McManus. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Limerick : Limerick Institute of Technology, 2011
Dissertation note: Thesis submitted for Bachelor of Science in Computer Networks and Systems Management (2011).
Availability: Items available for reference: Moylish Library: Library Use Only (1)Location, call number: Theses Collection Thesis B.Sc. CN & SM 11/04.
Wi-fi security : a review of protocols, algorithms and security measures for wi-fi LAN's today. [thesis] / Ian McNamara. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Limerick : Limerick Institute of Technology, 2011
Dissertation note: Thesis submitted for Bachelor of Science in Computer Networks and Systems Management (2011).
Availability: Items available for reference: Moylish Library: Library Use Only (1)Location, call number: Theses Collection Thesis B.Sc. CN & SM 11/05.
Penetration tester's open source toolkit [electronic book] / Jeremy Faircloth. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham, MA : Syngress, c2011
Online access:
Availability: No items available.
Industrial network security [electronic book] : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems / Eric Knapp. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham, MA : Syngress, 2011
Online access:
Availability: No items available.
Thor's Microsoft security bible [electronic book] : a collection of practical security techniques / Timothy Mullen. by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Waltham, MA : Syngress, c2011
Online access:
Availability: No items available.
Web application obfuscation [electronic book] : '-/WAFs..evasion..filters//alert (/obfuscation/)-' / Mario Heiderich ... [et al.]. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Burlington, MA : Syngress, c2011
Online access:
Availability: No items available.
Coding for penetration testers [electronic book] : building better tools / Jason Andress, Ryan Linn. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Syngress, 2011
Online access:
Availability: No items available.
Metasploit : the penetration tester's guide / by David Kennedy ... [et al.]. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: San Francisco : No Starch Press, c2011
Availability: Items available for loan: Moylish Library (1)Location, call number: Main Collection 005.8 KEN .
Cryptography and network security : principles and practice / William Stallings. by
Edition: 4th. Ed
Material type: Text Text; Format: print
Publication details: Upper Saddle River, N.J. : Prentice Hall, c2011
Availability: Items available for loan: Thurles Library (1)Location, call number: Main Collection 005.8 STA.
Pages

Powered by Koha