Skip to content
Toggle navigation
VuFind
0
Items in e-Shelf
(Full)
History
User Account
Logout
User Account
Help
English
Deutsch
Books & more
Articles & more
JuSER
All Fields
Title
Journal Title
Name
Institution
Subject
Classification
Shelf Classification
Table of Contents
DOI
ISBN/ISSN
Call number
Report Number
Barcode
Full Texts (available in selection)
Find
Advanced
Reset Filters
Computer networks
AND
Computers
Reset Filters
Show filters (2)
Computer networks
AND
Computers
Ask a Librarian
Books & more
: Hits
1 - 11
of
11
sort by
Relevance
Year (descending)
Year (ascending)
Call Number
Author
Title
Select all titles on this page
Email
Export
Print
Save
Add to e-Shelf
Select result number 1
1
E-Book
Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux [E-Book] /
Buchanan, Cameron
2014
Full text
Favorites
Saved in:
QR Code
Select result number 2
2
E-Book
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually [E-Book] /
Cardwell, Kevin
2014
Full text
Favorites
Saved in:
QR Code
Select result number 3
3
E-Book
Network security [E-Book] /
Perez, Andre
2014
Full text
Favorites
Saved in:
QR Code
Select result number 4
4
E-Book
Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach [E-Book] /
Jaswal, Nipun
2014
Full text
Favorites
Saved in:
QR Code
Select result number 5
5
E-Book
Metasploit penetration testing cookbook : over 70 recipes to master the most widely used penetration testing framework [E-Book] /
Singh, Abhinav.
2012
Full text
Favorites
Saved in:
QR Code
Select result number 6
6
E-Book
BackTrack 5 wireless penetration testing : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 [E-Book] /
Ramachandran, Vivek.
2011
Full text
Favorites
Saved in:
QR Code
Select result number 7
7
E-Book
Role-based access control / [E-Book]
Ferraiolo, David.
2007
Full text
Favorites
Saved in:
QR Code
Select result number 8
8
E-Book
Integrated security systems design : concepts, specifications, and implementation [E-Book] /
Norman, Thomas L.
2007
Full text
Favorites
Saved in:
QR Code
Select result number 9
9
E-Book
Identity and access management solutions : using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1 [E-Book] /
Ganci, John.
2005
Full text
Favorites
Saved in:
QR Code
Select result number 10
10
E-Book
Outsourcing information security [E-Book]/
Axelrod, C. Warren
2004
Full text
Favorites
Saved in:
QR Code
Select result number 11
11
E-Book
Role-based access control / [E-Book]
Ferraiolo, David.
2003
Full text
Favorites
Saved in:
QR Code
Select all titles on this page
Email
Export
Print
Save
Add to e-Shelf
/* Narrow Search Options */ ?>
Back
Narrow Search Results
Available as
Electronic Edition
11
Material Type
Book
11
Year of Publication
From:
To:
Location
ZB
11
Name
Chandramouli, Ramaswamy.
2
Ferraiolo, David.
2
Kuhn, D. Richard.
2
Axelrod, C. Warren
1
Buchanan, Cameron
1
Cardwell, Kevin
1
more ...
Ganci, John.
1
Jaswal, Nipun
1
Norman, Thomas L.
1
Perez, Andre
1
Ramachandran, Vivek.
1
Sawant, Aniket
1
Shi, Tony
1
Singh, Abhinav.
1
see all ...
less ...
Subject
Computer networks
Computers
Computer security.
3
Penetration testing (Computer security)
2
Computer security
1
Data encryption (Computer science)
1
more ...
Information storage and retrieval systems
1
Web portals
1
see all ...
less ...
Language
English
11
/* End Narrow Search Options */ ?>
×
Loading...