Search again

Found: 16  Titles

Order by :    Show:   Per Page
image
A guide to kernel exploitation attacking the core / Enrico Perla, Massimiliano Oldani.
Author
Perla, Enrico.
Published
Burlington, MA : Syngress, c2010.
Call Number
005.8,e-book

image

image

image
Managed code rootkits hooking into runtime environments / Erez Metula.
Author
Metula, Erez.
Published
Burlington, MA : Syngress, c2010.
Call Number
005.8,e-book

image
Network security know it all / by James Joshi ... [et al.].
Published
Burlington, MA : Morgan Kaufmann, c2008.
Call Number
005.8

image

image
Security breaches and threat prevention in the internet of things N. Jeyanthi and R. Thandeeswaran, editors.
Published
Hershey, PA : Information Science Reference, [2017].
Call Number
005.8,e-book

image
Seven deadliest Microsoft attacks Rob Kraus [and others].
Published
Amsterdam ; Boston : Syngress/Elsevier, c2010.
Call Number
005.8,e-book

image
Seven deadliest network attacks Stacy Prowell, Rob Kraus, Mike Borkin.
Author
Prowell, Stacy J.
Published
Amsterdam ; Boston : Syngress, c2010.
Call Number
005.8,e-book

image
Seven deadliest web application attacks Mike Shema.
Author
Shema, Mike.
Published
Amsterdam ; Boston : Syngress/Elsevier Science, c2010.
Call Number
005.8,e-book

image
Seven deadliest wireless technologies attacks Brad Haines ; technical editor, Tim Kramer.
Author
Haines, Brad.
Published
Burlington, MA : Syngress/Elsevier, c2010.
Call Number
005.8,e-book

image
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice / Steve Winterfield, Jason Andress.
Author
Winterfeld, Steve.
Published
[Place of publication not identified] : Syngress, 2012.
Call Number
005.8,e-book

image
The basics of hacking and penetration testing ethical hacking and penetration testing made easy / Patrick Engebretson.
Author
Engebretson, Pat
Published
Amsterdam : Syngress, an imprint of Elsevier, 2013.
Call Number
005.8,e-book

image
The basics of web hacking tools and techniques to attack the Web / Josh Pauli.
Author
Pauli, Joshua J.
Published
Amsterdam : Syngress, an imprint of Elsevier, 2013.
Call Number
005.8,e-book

image
UTM security with Fortinet Mastering FortiOS / Kenneth Tam [and others].
Published
[Place of publication not identified] : Syngress, 2013.
Call Number
005.8,e-book

Search Tools: Get RSS Feed

เว็บไซต์นี้ มีการเก็บข้อมูลการใช้งานเว็บไซต์ (Cookies) เพื่อมอบบริการที่ดีที่สุดสำหรับคุณ โดยการเข้าใช้งานเว็บไซต์ ถือเป็นการยอมรับใน นโยบายคุกกี้ (Cookies Policy) | นโยบายส่วนบุคคล (Privacy Policy) ตกลง

Style Switcher
Theme Colors

Layout Styles