Search ResultsElectronic Resources 
by
Couretas, Jerry M., 1966- author.
Format:
Excerpt:
) -- Developing model based cyber M&S frameworks -- Appendix : cyber M&S supporting data, tools & techniques.
by
Sianjina, Rayton R.
Format:
Excerpt:
technology use and policies and arms aspiring and practicing leaders with the necessary tools to protect
by
Carvey, Harlan.
ScienceDirect https://www.sciencedirect.com/science/book/9781597495806
Format:
Excerpt:
; Acknowledgments; About the Author; Chapter 1. Registry Analysis; Chapter 2. Tools; Chapter 3. Case Studies: The
by
Wotring, Brian.
ScienceDirect http://www.sciencedirect.com/science/book/9781597490184
Format:
Excerpt:
Threats; Planning; Host Integrity Monitoring with Open Source Tools; Osiris; Samhain; Log Monitoring and
by
Hurley, Chris.
ScienceDirect https://www.sciencedirect.com/science/book/9781931836036
Format:
Excerpt:
assessment. This book is written from the inside perspective of those who have created the tools that make
by
Boroojeni, Kianoosh G. author.
Format:
Excerpt:
computing and electrical engineering. The proposed methods are theoretically proofed by mathematical tools
by
Traoré, Issa. editor.
Format:
Excerpt:
-- Chapter 5. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis -- Chapter 6
by
Smallwood, Robert F., 1959-
Format:
Excerpt:
pt. 1. The problem and basic tools -- pt. 2. Information Platform risks and countermeasures -- pt
by
Knapp, Eric.
ScienceDirect http://www.sciencedirect.com/science/book/9781597496452
Format:
Excerpt:
security tools, this book gives you a clear understanding of SCADA and Control System protocols and how
by
Heiderich, Mario.
Format:
Excerpt:
vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses. Looks at security tools
by
Knapp, Eric.
ScienceDirect https://www.sciencedirect.com/science/book/9781597496452
Format:
Excerpt:
security tools, this book gives you a clear understanding of SCADA and Control System protocols and how
by
Engebretson, Pat (Patrick Henry), 1974-
ScienceDirect http://www.sciencedirect.com/science/book/9781597496551
Format:
Excerpt:
results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will

Select an Action





