Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Subject
Library
53 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Barrett, Diane.
      Format: 
      Excerpt: 
      , Parallels, Microsoft, and Sun Covers technological advances in virtualization tools, methods, and issues in
      by 
      Engebretson, Pat (Patrick Henry), 1974-
      Format: 
      Excerpt: 
      results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will
      by 
      Clark, Champ, III.
      Format: 
      Excerpt: 
      illustrate the threats and tools for specific solutions. * Provides IT Security Professionals with a first
      by 
      Schiller, Craig A.
      Format: 
      Excerpt: 
      Tools -- IRC and Botnets -- Advanced Ourmon Techniques -- Using Sandbox Tools for Botnets
      by 
      Speed, Tim.
      Format: 
      Excerpt: 
      Doing Here?; Chapter 10. Disaster Recovery; Appendix 1. Security Tools.
      by 
      Traxler, Julie.
      Format: 
      Excerpt: 
      Code; Chapter 4 Vulnerable CGI Scripts; Chapter 5 Hacking Techniques and Tools; Chapter 6 Code Auditing
      by 
      Stanger, James.
      Format: 
      Excerpt: 
      variety of Open Source security tools. The fact that Linux source code is readily available to every
      by 
      Miles, Wyman.
      Format: 
      Excerpt: 
      Solaris with freeware security tools -- Securing your users -- Securing your files -- Securing your
      by 
      Alsmadi, Izzat M. editor.
      Format: 
      Excerpt: 
      Engineering Attacks Using Information Fusion Techniques -- Part 3: Applications and tools. -Information Fusion
      by 
      Sagers, Glen., author.
      Format: 
      Excerpt: 
      individuals. The individual techniques and tools may vary by size, but everyone with a computer needs to turn
      by 
      Mullen, Timothy M.
      Format: 
      Excerpt: 
      particular applications, but WHY to do so DVD Companion disk with source code, tools, video tutorials, and
      by 
      Metula, Erez.
      Format: 
      Excerpt: 
      : Malware Development -- Chapter 03 -- Tools of the Trade -- Chapter 04 -- & nbsp;Runtime Modification