1
Embodied narratives : protecting identity interests through ethical governance of bioinformation [E-Book] /
Subject (ZB): ...Medical records -- Access control -- Psychological aspects....

Full text 
2
Hands-on AWS penetration testing with Kali Linux : set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation [E-Book] /
3
Hands-on penetration testing with Kali NetHunter : spy on and protect vulnerable ecosystems using the power of Kali linux for pentesting on the go [E-Book] /
4
Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOps [E-Book] /
5
Mastering metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit [E-Book] /
6
Attribute-based access control [E-Book] /
Subject (ZB): ...Computers -- Access control....

Full text 
7
Networking vehicles to everything : evolving automotive solutions [E-Book] /
Subject (ZB): ...Mobile communication systems Access control....

Full text 
8
Metasploit penetration testing cookbook : evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework, third edition [E-Book] /
9
Metasploit penetration testing cookbook : evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework Metasploit Penetration testing cookbook [E-Book] /
10
Metasploit for beginners : create a threat-free environment with the best-in-class tool [E-Book] /
11
Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack [E-Book] /
12
CMMI for Development : implementation guide [E-Book] /
Subject (ZB): ...Computers -- Access control....

Full text 
13
Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments [E-Book] /
14
Exploring encryption and potential mechanisms for authorized government access to plaintext : proceedings of a workshop [E-Book] /
Subject (ZB): ...Information storage and retrieval systems -- Access control -- Congresses....

Full text 
15
Essential skills for hackers [E-Book] /
Subject (ZB): ...Computer networks Access control....

Full text 
16
Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it [E-Book] /
17
Samsung ARTIK reference : the definitive developers guide [E-Book] /
18
Git essentials : create, merge, and distribute code with Git, the most powerful and flexible versioning system available [E-Book] /
19
Identity management for internet of things [E-Book] /
Subject (ZB): ...Computers Access control....

Full text 
20
Security intelligence : a practitioner's guide to solving enterprise security challenges [E-Book] /
Li, Qing
2015
Subject (ZB): ...Electronic information resources Access control....

Full text