Shortcuts
LiberoBanner . Default .
PageMenu- Main Menu-
Page content

Search Results

Your Search for COMPUTER SECURITY returned 6 Items

The titles shown in BOLD have items available, non bold titles do not have any items in stock
Display results in table format.



- Emerging trends in cybersecurity applications / edited by Kevin Daimi, Abeer Alsadoon, Cathryn Peoples, Nour El Madhoun. Emerging trends in cybersecurity applications / edited by Kevin Daimi, Abeer Alsadoon, Cathryn Peoples, Nour El Madhoun.005.8 ALSA 1 -
Title: Emerging trends in cybersecurity applications / edited by Kevin Daimi, Abeer Alsadoon, Cathryn Peoples, Nour El Madhoun.
Author:
Year: 2022
Collections: NonFiction.
Available at: Sydney.
- Fundamentals of information systems security / David Kim, Michael G. Solomon. Kim, David (Information technology security consultant) Fundamentals of information systems security / David Kim, Michael G. Solomon.005.8 DKIM 2018 2 -
Title: Fundamentals of information systems security / David Kim, Michael G. Solomon.
Author: Kim, David (Information technology security consultant)
Year: 2018
Collections: NonFiction, Reference.
Available at: Melbourne, Sydney.
- Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart. Nelson, Bill Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart.005.8 NELS 2019 3 -
Title: Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart.
Author: Nelson, Bill
Year: 2019
Collections: NonFiction, Reference.
Available at: Melbourne, Sydney.
- Principles of information security / Michael E. Whitman, Ph.D., CISM, CISSP, Herbert J. Mattord, Ph.D., CISM, CISSP, Kennesaw State University. Whitman, Michael E., 1964- Principles of information security / Michael E. Whitman, Ph.D., CISM, CISSP, Herbert J. Mattord, Ph.D., CISM, CISSP, Kennesaw State University.005.82 WHIT 2018 4 -
Title: Principles of information security / Michael E. Whitman, Ph.D., CISM, CISSP, Herbert J. Mattord, Ph.D., CISM, CISSP, Kennesaw State University.
Author: Whitman, Michael E., 1964-
Year: 2018
Collections: NonFiction, Reference.
Available at: Melbourne, Sydney.
- Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux / Joseph Muniz, Aamir Lakhani. Muniz, Joseph Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux / Joseph Muniz, Aamir Lakhani.006.74 MUNI 2013 5 -
Title: Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux / Joseph Muniz, Aamir Lakhani.
Author: Muniz, Joseph
Year: 2013
Collections: NonFiction.
Available at: Melbourne, Sydney.
- Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux / Joseph Muniz, Aamir Lakhani. Muniz, Joseph Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux / Joseph Muniz, Aamir Lakhani.006.74 NAJE 2018 6 -
Title: Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux / Joseph Muniz, Aamir Lakhani.
Author: Muniz, Joseph
Year: 2018
Collections: NonFiction.
Available at: Melbourne.