ORPP logo

Your search returned 11 results.

Sort
Results
1.
Kali Linux Wireless Penetration Testing Beginner's Guide : Master Wireless Testing Techniques to Survey and Attack Wireless Networks with Kali Linux, Including the KRACK Attack. by
Edition: 3rd ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Birmingham : Packt Publishing, Limited, 2017Copyright date: ©2017
Online resources:
Availability: No items available.

2.
Mastering Metasploit : Take Your Penetration Testing and IT Security Skills to a Whole New Level with the Secrets of Metasploit. by
Edition: 3rd ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Birmingham : Packt Publishing, Limited, 2018Copyright date: ©2018
Online resources:
Availability: No items available.

3.
Attribute-Based Access Control. by
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Norwood : Artech House, 2017Copyright date: ©2018
Online resources:
Availability: No items available.

4.
Git Essentials : Create, Merge, and Distribute Code with Git, the Most Powerful and Flexible Versioning System Available. by
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Birmingham : Packt Publishing, Limited, 2015Copyright date: ©2015
Online resources:
Availability: No items available.

5.
Linux Firewalls : Attack Detection and Response. by
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: San Francisco : No Starch Press, Incorporated, 2007Copyright date: ©2007
Online resources:
Availability: No items available.

6.
Wicked Cool Ruby Scripts : Useful Scripts That Solve Difficult Problems. by
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: San Francisco : No Starch Press, Incorporated, 2008Copyright date: ©2009
Online resources:
Availability: No items available.

7.
WebSphere Studio Asset Analyzer for Multiplatforms 3.1. by
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Durham : I B M, 2005Copyright date: ©2005
Online resources:
Availability: No items available.

8.
Critical Information Infrastructure Protection and the Law : An Overview of Key Issues. by
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Washington, D.C. : National Academies Press, 2003Copyright date: ©2003
Online resources:
Availability: No items available.

9.
Practical Deployment of Cisco Identity Services Engine (ISE) : Real-World Examples of AAA Deployments. by
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Rockland, MA : Elsevier Science & Technology Books, 2015Copyright date: ©2016
Online resources:
Availability: No items available.

10.
Identity Management for Internet of Things. by Series: River Publishers Series in Communications Series
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Aalborg : River Publishers, 2015Copyright date: ©2015
Online resources:
Availability: No items available.

11.
The Rise of the Computer State : The Threat to Our Freedoms, Our Ethics and Our Democratic Process. by
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Newburyport : Open Road Integrated Media, Inc., 2015Copyright date: ©2014
Online resources:
Availability: No items available.

Pages

© 2024 Resource Centre. All rights reserved.