Midlands State University Library

Your search returned 31 results.

Not what you expected? Check for suggestions
Sort
Results
Professional penetration testing : creating and learning in a hacking lab created by Thomas Wilhelm by
Edition: Second
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: Waltham: Elsevier, c2013
Availability: Items available for loan: Main Library (2)Call number: TK5105.59 WIL, ...

Computer and information security handbook / edited by John R. Vacca
Edition: Third edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Morgan Kaufmann Publishers, [2017]
Availability: Items available for loan: Main Library (3)Call number: QA76.9.A25 COM, ...

Computer and information security handbook / edited by John R. Vacca. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Original language: English Publisher: Amsterdam : Morgan Kaufmann, an imprint of Elsevier, 2013Publisher: c2013
Availability: Items available for loan: Main Library (1)Call number: QA76.9.A25 COM.

Eleventh hour CISSP : study guide / created by Eric Conrad, Seth Misenar and Joshua Feldman; edited by Simon Bryan. by
Edition: Third edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Elsevier, 2017Copyright date: ©2017
Availability: Items available for loan: Main Library (1)Call number: TK5105.59 CON.

Windows registry forensics : advanced digital forensic analysis of the Windows registry / created by Harlan Carvey. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Elsevier, 2016
Availability: Items available for loan: Main Library (1)Call number: HV8079 CAR.

Social engineering penetration testing : executing social engineering pen tests, assessments and defense / created by Gavin Watson, Andrew Mason and Richard Ackroyd. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Oxford: Elsevier, 2014Copyright date: ©2014
Availability: Items available for loan: Main Library (1)Call number: HM668 WAT.

Theoretical and experimental methods for defending against DDoS attacks / created by Mohammad Reza Khalifeh Soltanian and Iraj Sadegh Amiri; edited by Matthew Neely. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Waltham: Elsevier; 2016Copyright date: ©2016
Availability: Items available for loan: Main Library (1)Call number: TK5109.59 REZ.

Comptia cysa+ practice tests : exam cs0-002 / created by Mike Chappel and David Seidl. by
Edition: Second Edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: John Wiley and Sons, 2020
Availability: Items available for loan: Main Library (1)Call number: QA76.3 CHA.

Comptia security+ tudy guide : exam sy0-601 / created by Mike Chapple and David Seidl. by
Edition: Eighth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, 2021
Availability: Items available for loan: Main Library (1)Call number: QA76.9.A25 CHA.

Comptia® Security+® Practice Tests : exam sy0-601 / created by David Seidl. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: John Wiley and Sons, 2020
Availability: Items available for loan: Main Library (2)Call number: QA76.9.A25 SEI, ...

The art of penetration testing : how to take over any company in the world / created by Royce Davis. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Manning Publications Company, 2020
Availability: Items available for loan: Main Library (2)Call number: TK5105.59 DAV, ...

Pages