Searching Books & More : *

T X Computer networks X Computer crimes X
22 results found in Books & More
RSS
Cover images provided by Open Library

Cisco router and switch forensics investigating and analyzing malicious network activity

Published: Burlington, MA : Syngress, c2009
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Cisco router and switch forensics investigating and analyzing malicious network activity

Published: Burlington, Mass. : Syngress Pub., c2009
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Computer incident response and product security

Published: Indianapolis, Ind. : Cisco Press, c2011
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Cybersecurity managing systems, conducting testing, and investigating intrusions

Published: Indianapolis, Ind. : John Wiley & Sons, c2014
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Hacking exposed mobile security secrets & solutions

Published: New York : McGraw-Hill, [2013]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Hacking web apps detecting and preventing web application security problems

Published: Waltham, MA : Syngress, c2012
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Incident response a strategic guide to handling system and network security breaches

Published: Indianapolis, Ind. : New Riders Pub., c2002
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

InfoSec career hacking sell your skillz, not your soul

Published: Rockland, MA : Syngress Pub., c2005
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Internet denial of service : attack and defense mechanisms

Published: Upper Saddle River, NJ : Prentice Hall Professional Technical Reference, c2005
Format: Print
Retrieving Holdings Information
Cover images provided by Open Library

Managing cyber threats issues, approaches, and challenges

Published: New York : Springer, c2005
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Network intrusion analysis methodologies, tools, and techniques for incident analysis and response

Published: Waltham, MA : Syngress, c2012
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Networks and network analysis for defence and security

Published: Cham [Germany] : Springer, 2014
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Reverse deception organized cyber threat counter-exploitation

Published: New York : McGraw-Hill, c2012
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Seven deadliest social network attacks

Published: Burlington, MA : Syngress/Elsevier, c2010
Format: Electronic Resource, Remote
Retrieving Holdings Information