1   2   Next   Last Page 
Linux basics for hackers : getting started with networking, scripting, and security in Kali

Linux basics for hackers : getting started with networking, scripting, and security in Kali

Edition : 1st ed. Pdf ed.
Call Number : 005.8 OCC l
Availability : 1 copies available for loan
Beginning Ethical Hacking With Kali Linux : Computational Techniques For Resolving Security Issues

Beginning Ethical Hacking With Kali Linux : Computational Techniques For Resolving Security Issues

Edition : Pdf ed.
Call Number : 005.8 SIN b
Availability : 1 copies available for loan
Ethical Hacking And Penetration Testing Guide

Ethical Hacking And Penetration Testing Guide

Edition : Pdf ed.
Call Number : 005.8 BAL e
Availability : 1 copies available for loan
Research Methods For Cyber Security

Research Methods For Cyber Security

Edition : Pdf ed.
Call Number : 005.8072 EDG r
Availability : 1 copies available for loan
Membasmi Virus Komputer dan Android

Membasmi Virus Komputer dan Android

Edition : 1st ed.
Call Number : 005.8 KUR m
Availability : 1 copies available for loan
Seni teknik hacking : uncensored

Seni teknik hacking : uncensored

Edition : 1st ed.
Call Number : 005.8 STO s
Availability : 1 copies available for loan
A comprehensive guide to 5G security

A comprehensive guide to 5G security

Edition :
Call Number : 005.8 COM
Availability : 1 copies available for loan
Building a practical information security program

Building a practical information security program

Edition :
Call Number : 005.8 AND b
Availability : 1 copies available for loan
Mobile security and privacy : advances, challenges and future research directions

Mobile security and privacy : advances, challenges and future research directions

Edition :
Call Number : 005.8 MOB
Availability : 1 copies available for loan
Certified information systems security professional : (ISC)2 CISSP official practice tests

Certified information systems security professional : (ISC)2 CISSP official practice tests

Edition : 2nd
Call Number : 005.8 CHA cp
Availability : 1 copies available for loan
The Basic of cyber safety : computer and mobile device safety made easy

The Basic of cyber safety : computer and mobile device safety made easy

Edition :
Call Number : 005.8 SAM b
Availability : 1 copies available for loan
Beginning ethical hacking with Kali Linux : computational techniques for resolving security issues

Beginning ethical hacking with Kali Linux : computational techniques for resolving security issues

Edition :
Call Number : 005.8 SIN b
Availability : 1 copies available for loan
Information governance : concepts, strategies and best practices

Information governance : concepts, strategies and best practices

Edition : 2nd
Call Number : 658.4 SMA i
Availability : 1 copies available for loan
Demystifying internet of things security : successful IoT device / edge and platform security development

Demystifying internet of things security : successful IoT device / edge and platform security development

Edition : PDF ed.
Call Number : 005.8 CHE d
Availability : 1 copies available for loan
Penetration testing for dummies

Penetration testing for dummies

Edition : PDF ed.
Call Number : 005.8 SHI p
Availability : 1 copies available for loan
Cryptography made simple

Cryptography made simple

Edition : PDF ed.
Call Number : 005.8 NIG c
Availability : 1 copies available for loan
Guide to computer network security

Guide to computer network security

Edition : 4th ed. PDF ed.
Call Number : 005.8 KIZ g
Availability : 1 copies available for loan
Hands-on machine learning for cybersecurity : safeguard your system by making your machines intelligent using the Python ecosystem

Hands-on machine learning for cybersecurity : safeguard your system by making your machines intelligent using the Python ecosystem

Edition :
Call Number : 005.8 HAL h
Availability : none copy available
Hacking website : menemukan celah keamanan & melindungi website dari serangan hacker

Hacking website : menemukan celah keamanan & melindungi website dari serangan hacker

Edition :
Call Number : 005.8 KID h
Availability : 2 copies available for loan
Certified information systems security professional : official study guide

Certified information systems security professional : official study guide

Edition : 8th ed.
Call Number : 005.8 CHA c
Availability : 1 copies available for loan
Effective cyber security : a guide to using best practices and standards

Effective cyber security : a guide to using best practices and standards

Edition :
Call Number : 005.8 STA e
Availability : 1 copies available for loan
International conference on data management

International conference on data management

Edition :
Call Number : P 004 INT
Availability : 1 copies available for loan
The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of big brother and big data

The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of big brother and big data

Edition :
Call Number : 005.8 MIT a
Availability : 1 copies available for loan
CISA : certified information systems auditor : study guide

CISA : certified information systems auditor : study guide

Edition : 4th ed.
Call Number : 005.8076 CAN c
Availability : 1 copies available for loan
Computer security

Computer security

Edition :
Call Number : 005.8 ARI c
Availability : 1 copies available for loan
Research methods for cyber security

Research methods for cyber security

Edition :
Call Number : 005.8072 EDG r
Availability : 1 copies available for loan
Audio content security : attack analysis on audio watermarking

Audio content security : attack analysis on audio watermarking

Edition :
Call Number : 005.8 GHO a
Availability : 1 copies available for loan
Cryptography and network security

Cryptography and network security

Edition : International ed.
Call Number : 005.8 FOR c
Availability : 1 copies available for loan
Cryptography and network security : principles and practice

Cryptography and network security : principles and practice

Edition : 6th ed.
Call Number : 005.8 STA c
Availability : 1 copies available for loan
Computer security : principles and practice

Computer security : principles and practice

Edition : 2nd ed.
Call Number : 005.8 STA cs
Availability : 1 copies available for loan
iPad geekery : 50 insanely cool hacks and mods for your apple tablet

iPad geekery : 50 insanely cool hacks and mods for your apple tablet

Edition :
Call Number : 005.8 HAR i
Availability : 1 copies available for loan
Core software security : security at the source

Core software security : security at the source

Edition :
Call Number : 005.8 RAN c
Availability : 1 copies available for loan
Hacking : basic security, penetration testing, and how to hack

Hacking : basic security, penetration testing, and how to hack

Edition :
Call Number : 005.8 SHA h
Availability : 2 copies available for loan
Computer security : principles and practice

Computer security : principles and practice

Edition : 3rd ed.
Call Number : 005.8 STA cs 2015
Availability : 1 copies available for loan
Security and privacy in internet of things (IoTs) : models, algorithms, and implementations

Security and privacy in internet of things (IoTs) : models, algorithms, and implementations

Edition :
Call Number : 005.8 SEC
Availability : 1 copies available for loan
Ethical hacking and penetration testing guide

Ethical hacking and penetration testing guide

Edition :
Call Number : 005.8 BAL e
Availability : 1 copies available for loan
Cloud computing security : foundations and challenges

Cloud computing security : foundations and challenges

Edition :
Call Number : 005.8 CLO
Availability : 1 copies available for loan
The complete guide to cybersecurity risks and controls

The complete guide to cybersecurity risks and controls

Edition :
Call Number : 005.8 KOH c
Availability : 1 copies available for loan
Kriptografi untuk keamanan jaringan dan implementasinya dalam bahasa Java

Kriptografi untuk keamanan jaringan dan implementasinya dalam bahasa Java

Edition :
Call Number : 005.8 SAD k
Availability : 1 copies available for loan
CASP CompTIA advanced security practitioner certification study guide (Exam CAS-001)

CASP CompTIA advanced security practitioner certification study guide (Exam CAS-001)

Edition :
Call Number : 005.8076 CON c
Availability : 3 copies available for loan
 1   2   Next   Last Page 

Search Result


Found 42 from your keywords: Subject : "Computer security"
Query took 0.07059 second(s) to complete
XML ResultJSON Result

Information


Matana University Online Public Access Catalog. For assistance, contact your librarian by email [email protected].