|
|
Insider threats / Pierre-Emmanuel Arduin.
by Arduin, Pierre-Emmanuel [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: London : Hoboken, NJ : ISTE Ltd. ; John Wiley & Sons, Inc., 2018Online access: Wiley Online Library Availability: No items available
|
|
|
Windows security monitoring : scenarios and patterns / Andrei Miroshnikov.
by Miroshnikov, Andrei [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Indianapolis, IN : John Wiley & Sons, Inc., [2018]Copyright date: ©2018Online access: Wiley Online Library Availability: No items available
|
|
|
Cloud computing and virtualization / edited by Dac-Nhuong Le, Raghvendra Kumar, Gia Nhu Nguyen, Jyotir Moy Chatterjee.
by Le, Dac-Nhuong, 1983- [editor.] | Kumar, Raghvendra, 1987- [editor.] | Nguyen, Nhu Gia [editor.] | Chatterjee, Jyotir Moy [editor.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, NJ : Beverly, MA : John Wiley & Sons ; Scrivener Publishing, 2018Online access: Wiley Online Library Availability: No items available
|
|
|
CCNA security study guide : exam 210-260 / Troy McMillan.
by McMillan, Troy [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Indianapolis, Indiana : Sybex, a Wiley Brand, [2018]Online access: Wiley Online Library Availability: No items available
|
|
|
CCSP official (ISC)2 practice tests / Ben Malisow.
by Malisow, Ben [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Indianapolis, Indiana : Sybex, a Wiley brand, 2018Online access: Wiley Online Library Availability: No items available
|
|
|
CCSP® (ISC)2® certified cloud security professional : official study guide / Brian T. O'Hara, Ben Malisow.
by O'Hara, Brian T [author.] | Malisow, Ben [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Indianapolis, Indiana : Sybex, a Wiley brand, 2017Online access: Wiley Online Library Availability: No items available
|
|
|
Comprehensive guide to 5G security / edited by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila.
by Liyanage, Madhusanka [editor.] | Ahmad, Ijaz, 1985- [editor.] | Abro, Ahmed Bux [editor.] | Gurtov, Andrei [editor.] | Ylianttila, Mika [editor.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, NJ : John Wiley & Sons, 2018Online access: Wiley Online Library Availability: No items available
|
|
|
Secure connected objects / Dominique Paret, Jean-Paul Huon.
by Paret, Dominique | Huon, Jean-Paul. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: [Place of publication not identified] : John Wiley & Sons, Inc. 2017Online access: Wiley Online Library Availability: No items available
|
|
|
Wireshark for security professionals : using Wireshark and the Metasploit Framework / Jessey Bullock, Jeff T. Parker.
by Bullock, Jessey [author.] | Gordon, Adam [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Indianapolis, IN : Wiley, 2017Online access: Wiley Online Library Availability: No items available
|
|
|
Hacking the hacker : learn from the experts who take down hackers / Roger A. Grimes.
by Grimes, Roger A [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Indianapolis, IN : Wiley, 2017Online access: Wiley Online Library Availability: No items available
|
|
|
Advanced penetration testing : hacking the world's most secure networks / Wil Allsopp.
by Allsopp, Wil [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: [Place of publication not identified] : Wiley, 2017Online access: Wiley Online Library Availability: No items available
|
|
|
Security and privacy in cyber-physical systems : foundations, principles, and applications / edited by Houbing Song, Glenn A. Fink, Sabina Jeschke.
by Song, Houbing [editor.] | Fink, Glenn A [editor.] | Jeschke, Sabina [editor.]. Edition: First edition.Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, NJ : John Wiley & Sons, Inc., 2018Copyright date: ©2018Online access: Wiley Online Library Availability: No items available
|
|
|
Network forensics / Ric Messier.
by Messier, Ric [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Indianapolis, IN : Wiley, 2017Online access: Wiley Online Library Availability: No items available
|
|
|
DNS security management / Michael Dooley, Timothy Rooney.
by Dooley, Michael (Computer scientist) [author.] | Rooney, Tim [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, New Jersey : Piscataway, NJ : John Wiley and Sons, Inc. ; IEEE Press, [2017]Online access: Wiley Online Library Availability: No items available
|
|
|
Cyber smart : five habits to protect your family, money, and identity from cyber criminals / Bart R. McDonough.
by McDonough, Bart R [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Indianapolis, IN : John Wiley & Sons, Inc., [2019]Copyright date: ©2019Online access: Wiley Online Library Availability: No items available
|
|
|
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies / edited by DacNhuong Le, Haiphong University, Haiphong, Vietnam, Raghvendra Kumar, LNCT College, India, Brojo Kishore Mishra, C.V. Raman College of Engineering, Bhubaneswar, India, Manju Khari, Ambedkar Institute of Advance Communication Technologies & Research, India, Jyotir Moy Chatterjee, Asia Pacific University of Technology & Innovation, Kathmandu, Nepal.
by Le, Dac-Nhuong, 1983- [editor.] | Kumar, Raghvendra, 1987- [editor.] | Mishra, Brojo Kishore, 1979- [editor.] | Khari, Manju [editor.] | Chatterjee, Jyotir Moy [editor.]. Edition: First edition.Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, NJ : Beverly, MA : John Wiley & Sons, Inc. ; Scrivener Publishing LLC, [2019]Online access: Wiley Online Library Availability: No items available
|
|
|
Cybersecurity blue team toolkit / Nadean H. Tanner.
by Tanner, Nadean H [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Indianapolis, IN : Wiley, 2019Online access: Wiley Online Library Availability: No items available
|
|
|
The official (ISC)² CISSP CBK reference / John Warsinkse ; with Mark Graff, Kevin Henry, Christopher Hoover, Ben Malisow, Sean Murphy, C. Paul Oakes, George Pajari, Jeff T. Parker, David Seidl, Mike Vasquez.
by Warsinske, John [author.] | Graff, Mark [contributor.] | Henry, Kevin [contributor.] | Hoover, Christopher [contributor.] | Malisow, Ben [contributor.] | Murphy, Sean [contributor.] | Oakes, Charles [contributor.] | Pajari, George [contributor.] | Parker, Jeff T [contributor.] | Seidl, David [contributor.] | Vasquez, Mike [contributor.]. Edition: Fifth edition.Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, NJ : Sybex, 2019Other title: Official ISC2 CISSP CBK reference.Online access: Wiley Online Library Availability: No items available
|
|
|
Blockchain for distributed systems security / edited by Sachin S. Shetty, Charles A. Kamhoua, Laurent L. Njilla.
by Shetty, Sachin [editor.] | Kamhoua, Charles A [edtior.] | Njilla, Laurent L [editor.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, New Jersey : Wiley-IEEE, [2019]Online access: Wiley Online Library Availability: No items available
|
|
|
Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors / Perry Carpenter.
by Carpenter, Perry [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Indianapolis, IN : Wiley, 2019Online access: Wiley Online Library Availability: No items available
|