Your search returned 44 results.

Sort
Results
1.
Image from Google Jackets
Windows forensic analysis DVD toolkit 2E Harlan Carvey ; Eoghan Casey, technical editor by
Publication details: Burlington Syngress Publishing, Inc c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968364 CAR.

2.
Image from Google Jackets
Enemy at the water cooler : real-life stories of insider threats and enterprise security management countermeasures Brian T Contos by
Publication details: Rockland, MA Syngress 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 CON.

3.
Image from Google Jackets
Information security risk analysis Contributed by Joseph Elias Mbowe and Irina Zlotnikova et al by
Publication details: London Koros Press Limited 2016
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MBO.

4.
Image from Google Jackets
Scene of the cybercrime :Computer Forensics by Siti Rahayu Selamat ,Shahrin Sahib et al. by Language: English
Publication details: United kingdom Koros Press Limited 2015
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 SEL.

5.
Image from Google Jackets
Open Source Intelligence Methods and tools: A Practical Guide to online Intelligence / Nihad A. Hassan by Language: English
Publication details: United States : Apress, c2018
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 004.678 HAS;1.

6.
Image from Google Jackets
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks / Mike O'Leary by
Edition: 1st edition
Language: English
Publication details: [Berkeley, CA] Apress 2022
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.8 OLE.

7.
Image from Google Jackets
Modern cybersecurity strategies for enterprises / Ashish Mishra Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with tested and proven methods by Language: English
Publication details: London Bpb Publications c2023
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.8 MIS, ...

8.
Image from Google Jackets
Learn penetration testing with python 3.x / Yehia Elghaly perform offensive pentesting and prepare red teaming to prevent network attacks and web vulnerabilities by
Edition: 1st ed.
Language: English
Publication details: New Delhi : Bpb Publications c2022
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.133P ELG, ...

9.
Image from Google Jackets
Ethically Hacking An industrial Control Systemnew / Sharon Ferrone by Language: English
Publication details: New Delhi Bpb Publications 2022
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.8 FER, ...

10.
Image from Google Jackets
AD HOC Mobile Wireless Networks Protocols and systems / C.-K. Toh by
Edition: 5th edition
Language: eng
Publication details: Uttar Pradesh Pearson India Education Services 2019
Availability: Items available for loan: Anna Centenary Library (1)Call number: 4.65 TOH.

11.
Image from Google Jackets
Cryptography and Network Security: Principles and Practices / William Stallings by
Edition: 1st edition
Language: English
Publication details: Uttar pradesh Pearson 2023
Availability: Not available: Anna Centenary Library: Checked out (1).

12.
Image from Google Jackets
Certified ethical hacker (CEH) v12 312-50 exam guide Keep up to date with ethical hacking trends and hone your skills with hands-on activities by Language: English
Publication details: UK : Packt c2022
Availability: Items available for reference: Anna Centenary Library: Not for loan (2)Call number: 005.8 MER, ...

13.
Image from Google Jackets
Learn ethical hacking from scratch your stepping stone to penetration testing by Language: English
Publication details: Birmingham, UK : Packt c2018
Availability: Items available for reference: Anna Centenary Library: Not for loan (2)Call number: 005.8 SAB, ...

14.
Image from Google Jackets
Learn wireshark confidently navigate the wireshark interface and solve real-world networking problems by Language: English
Publication details: Birmingham, UK : Packt c2019
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BOC. Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.8 BOC;1.

15.
Image from Google Jackets
Practical cloud security : a guide for secure design and deployment / Chris Dotson by
Edition: 1st edition
Language: English
Publication details: Sebastopol, CA, O'Reilly Media, Inc., 2021
Availability: Items available for loan: Anna Centenary Library (2)Call number: 004.6782 DOT, ...

16.
Image from Google Jackets
Web application security /Andrew Hoffman exploitation and countermeasures for modern web applications by
Edition: 1st ed.
Language: English
Publication details: Sebastopol, CA O'Reilly Media c2020
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.76 HOF;1. Not available: Anna Centenary Library: Checked out (1).

17.
Image from Google Jackets
Build Your Own Cybersecurity Testing Lab / Ric Messier Low-cost Solutions for Testing in Virtual and Cloud-based Environments by
Edition: 1st ed.
Language: English
Publication details: Chennai McGraw-Hill c2020
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.8 MES, ...

18.
Image from Google Jackets
97 Things Every Information Security Professional Should Know Collective Wisdom From The Experts /Christina Morillo by
Edition: 1st edition
Language: English
Publication details: , Sebastopol, California, O'Reilly Media, Inc. 2021
Availability: Not available: Anna Centenary Library: Checked out (2).

19.
Image from Google Jackets
Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications / Carlo Scarioni, and Massimo Nardone by
Edition: 2nd ed.
Language: English
Publication details: : India Apress, c2019
Availability: Items available for reference: Anna Centenary Library: Not for loan (2)Call number: 005.8 SCA, ...

20.
Image from Google Jackets
Serverless security /Miguel A. Calles : understand, assess, and implement secure and reliable applications in AWS, microsoft azure, and google cloud by Language: English
Publication details: New York : Apress c2020
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 CAL. Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.8 CAL;1.

21.
Image from Google Jackets
Understand, manage, and measure cyber risk /Ryan Leirvik practical solutions for creating a sustainable cyber program by Language: English
Publication details: New York : Apress, c2022
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.8 LEI, ...

22.
Image from Google Jackets
Cybersecurity incident response /Eric C. Thompson by Language: English
Publication details: Apress c2018
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 THO. Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.8 THO;1.

23.
Image from Google Jackets
Open Source Intelligence Methods and Tools: a Practical Guide to Online Intelligence Nihad A. Hassan (Author), Rami Hijazi, Rami Hijazi by Language: English
Publication details: [United States] : Apress, c2018
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 004.678 HAS.

24.
Image from Google Jackets
Mastering Azure Security / Toroman, Mustafa ,Tom Janetscheck by
Edition: 2nd edition
Language: English
Publication details: UK Packt 2022
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.8 MUS.

25.
Image from Google Jackets
Penetration testing azure for ethical hackers / Okeyode, David develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments by Language: English
Publication details: Birmingham, UK : Packt c2021
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.8 OKE.

26.
Image from Google Jackets
The art of intrusion the real stories behind the exploits of hackers, intruders and deceivers by Language: English
Publication details: Canada : Wiley publishing c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MIT.

27.
Image from Google Jackets
Hacker techniques, tools, and incident handling by
Edition: 3rd ed.
Language: English
Publication details: Burlington, MA : Jones & Bartlett Learning, c2020
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.82 ORI.

28.
Image from Google Jackets
Network security, firewalls, and VPNs by
Edition: 2nd ed.
Language: English
Publication details: Burlington, Mass : Jones & Bartlett Learning, c2014
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.82 STE.

29.
Image from Google Jackets
Security transformation : digital defense strategies to protect your company's reputation and market share / Mary Pat McCarthy, Stuart Campbell ; with Rob Brownstein. by
Edition: 1st ed.
Language: English
Publication details: New York : McGraw-Hill , c2001
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 658 MCC.

30.
Image from Google Jackets
Securing And Controlling Cisco Routers Peter T. Davis by Language: English
Publication details: Boca Raton Auerbach Publications, 2002
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 004.6 DAV.

31.
Image from Google Jackets
Seven Deadliest Web Application Attacks Mike Shema by Language: English
Publication details: Amsterdam Syngress/elsevier Science 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.678 .

32.
Image from Google Jackets
Security Policies And Implementation Issues Rob Johnson by Language: English
Publication details: Sudbury, Mass., Jones & Bartlett Learning ,©2011
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005 JOH.

33.
Image from Google Jackets
Selinux By Example : using security enhanced linux Frank Mayer, Karl MacMillan, David Caplan by Language: English
Publication details: Upper Saddle River, Nj, Prentice Hall, ©2007
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.8 MAY.

34.
Image from Google Jackets
Software Testing And Continuous Quality Improvement, 3rd Edition /William Lewis by
Edition: 3rd ed
Language: English
Publication details: Auerbach Publications, 2017
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.4 LEW.

35.
Image from Google Jackets
The Art Of Software Security Assessment : Identifying And Preventing Software Vulnerabilities /Mark Dowd by Language: English
Publication details: Addison-wesley, Indianapolis, Ind., ©2007
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.8 DOW.

36.
Image from Google Jackets
Security+ Guide To Network Security Fundamentals /Mark D. Ciampa by
Edition: 3rd ed
Language: English
Publication details: Course Technology/ Cengage Learning, Boston, Ma., ©2009
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.8 CIA.

37.
Image from Google Jackets
Security Administrator Street Smarts A Real World Guide To Comptia Security+ Skills /David Miller, Michael C. Gregg by
Edition: 2nd ed.
Language: English
Publication details: Wiley Pub, Indianapolis, Ind, ©2009
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.8 MIL.

38.
Image from Google Jackets
Techno Security's Guide To Managing Risks: For It Managers, Auditors, And Investigators /Jack Wiles by Language: English
Publication details: Elsevier, Burlington, Mass., 2007
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.8 WIL.

39.
Image from Google Jackets
Rethinking Public Key Infrastructures And Digital Certificates : Building In Privacy /Stefan A. Brands by Language: English
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.8 BRA.

40.
Image from Google Jackets
The Complete Cisco Vpn Configuration Guide /Richard A. Deal by Language: English
Publication details: Indianapolis Cisco Press 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 DEA.

41.
Image from Google Jackets
Security In An Ipv6 Environment /Daniel Minoli, Jake Kouns by Language: English
Publication details: Auerbach Publications, 2016
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MIN.

42.
Image from Google Jackets
Secure Internet Practices: Best Practices For Securing Systems In The Internet And E-business Age Patrick McBride by Language: English
Publication details: New York Auerbach 2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MCB.

43.
Image from Google Jackets
Security In Distributed, Grid, Mobile, And Pervasive Computing Yang Xiao by Language: English
Publication details: Boca Raton Auerbach Publications 2007
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.8 XIA.

44.
Image from Google Jackets
Security And Cooperation In Wireless Networks : thwarting malicious and selfish behavior in the age of ubiquitous computing Levente Buttyán, Jean-Pierre Hubaux by Language: English
Publication details: Cambridge Cambridge University Press 2008
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 005.8 BUT.

Find us on the map