Search ResultsElectronic Resources 
by
Barrett, Diane.
ScienceDirect http://www.sciencedirect.com/science/book/9781597495578
Format:
Excerpt:
, Parallels, Microsoft, and Sun Covers technological advances in virtualization tools, methods, and issues in
by
Engebretson, Pat (Patrick Henry), 1974-
ScienceDirect https://www.sciencedirect.com/science/book/9781597496551
Format:
Excerpt:
results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will
by
Clark, Champ, III.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492249
Format:
Excerpt:
illustrate the threats and tools for specific solutions. * Provides IT Security Professionals with a first
by
Schiller, Craig A.
ScienceDirect https://www.sciencedirect.com/science/book/9781597491358
Format:
Excerpt:
Tools -- IRC and Botnets -- Advanced Ourmon Techniques -- Using Sandbox Tools for Botnets
by
Speed, Tim.
ScienceDirect http://www.sciencedirect.com/science/book/9781555582982
Format:
Excerpt:
Doing Here?; Chapter 10. Disaster Recovery; Appendix 1. Security Tools.
by
Traxler, Julie.
ScienceDirect https://www.sciencedirect.com/science/book/9781928994312
Format:
Excerpt:
Code; Chapter 4 Vulnerable CGI Scripts; Chapter 5 Hacking Techniques and Tools; Chapter 6 Code Auditing
by
Stanger, James.
ScienceDirect http://www.sciencedirect.com/science/book/9781928994343
Format:
Excerpt:
variety of Open Source security tools. The fact that Linux source code is readily available to every
by
Miles, Wyman.
ScienceDirect http://www.sciencedirect.com/science/book/9781928994442
Format:
Excerpt:
Solaris with freeware security tools -- Securing your users -- Securing your files -- Securing your
by
Alsmadi, Izzat M. editor.
Format:
Excerpt:
Engineering Attacks Using Information Fusion Techniques -- Part 3: Applications and tools. -Information Fusion
by
Sagers, Glen., author.
Format:
Excerpt:
individuals. The individual techniques and tools may vary by size, but everyone with a computer needs to turn
by
Mullen, Timothy M.
ScienceDirect http://www.sciencedirect.com/science/book/9781597495721
Format:
Excerpt:
particular applications, but WHY to do so DVD Companion disk with source code, tools, video tutorials, and
by
Metula, Erez.
ScienceDirect http://www.sciencedirect.com/science/book/9781597495745
Format:
Excerpt:
: Malware Development -- Chapter 03 -- Tools of the Trade -- Chapter 04 -- & nbsp;Runtime Modification

Select an Action





