Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Subject
Library
53 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Couretas, Jerry M., 1966- author.
      Format: 
      Excerpt: 
      ) -- Developing model based cyber M&S frameworks -- Appendix : cyber M&S supporting data, tools & techniques.
      by 
      Sianjina, Rayton R.
      Format: 
      Excerpt: 
      technology use and policies and arms aspiring and practicing leaders with the necessary tools to protect
      by 
      Carvey, Harlan.
      Format: 
      Excerpt: 
      ; Acknowledgments; About the Author; Chapter 1. Registry Analysis; Chapter 2. Tools; Chapter 3. Case Studies: The
      by 
      Wotring, Brian.
      Format: 
      Excerpt: 
      Threats; Planning; Host Integrity Monitoring with Open Source Tools; Osiris; Samhain; Log Monitoring and
      by 
      Hurley, Chris.
      Format: 
      Excerpt: 
      assessment. This book is written from the inside perspective of those who have created the tools that make
      by 
      Boroojeni, Kianoosh G. author.
      Format: 
      Excerpt: 
      computing and electrical engineering. The proposed methods are theoretically proofed by mathematical tools
      by 
      Traoré, Issa. editor.
      Format: 
      Excerpt: 
      -- Chapter 5. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis -- Chapter 6
      by 
      Smallwood, Robert F., 1959-
      Format: 
      Excerpt: 
      pt. 1. The problem and basic tools -- pt. 2. Information Platform risks and countermeasures -- pt
      by 
      Knapp, Eric.
      Format: 
      Excerpt: 
      security tools, this book gives you a clear understanding of SCADA and Control System protocols and how
      by 
      Heiderich, Mario.
      Format: 
      Excerpt: 
      vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses. Looks at security tools
      by 
      Knapp, Eric.
      Format: 
      Excerpt: 
      security tools, this book gives you a clear understanding of SCADA and Control System protocols and how
      by 
      Engebretson, Pat (Patrick Henry), 1974-
      Format: 
      Excerpt: 
      results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will