Collections
Linux basics for hackers : getting started with networking, scripting, and security in Kali
Edition : 1st ed. Pdf ed.
Call Number : 005.8 OCC l
Availability : 1 copies available for loan
Beginning Ethical Hacking With Kali Linux : Computational Techniques For Resolving Security Issues
Edition : Pdf ed.
Call Number : 005.8 SIN b
Availability : 1 copies available for loan
Ethical Hacking And Penetration Testing Guide
Edition : Pdf ed.
Call Number : 005.8 BAL e
Availability : 1 copies available for loan
Research Methods For Cyber Security
Edition : Pdf ed.
Call Number : 005.8072 EDG r
Availability : 1 copies available for loan
Membasmi Virus Komputer dan Android
Edition : 1st ed.
Call Number : 005.8 KUR m
Availability : 1 copies available for loan
Seni teknik hacking : uncensored
Edition : 1st ed.
Call Number : 005.8 STO s
Availability : 1 copies available for loan
A comprehensive guide to 5G security
Edition :
Call Number : 005.8 COM
Availability : 1 copies available for loan
Building a practical information security program
Edition :
Call Number : 005.8 AND b
Availability : 1 copies available for loan
Mobile security and privacy : advances, challenges and future research directions
Edition :
Call Number : 005.8 MOB
Availability : 1 copies available for loan
Certified information systems security professional : (ISC)2 CISSP official practice tests
Edition : 2nd
Call Number : 005.8 CHA cp
Availability : 1 copies available for loan
The Basic of cyber safety : computer and mobile device safety made easy
Edition :
Call Number : 005.8 SAM b
Availability : 1 copies available for loan
Beginning ethical hacking with Kali Linux : computational techniques for resolving security issues
Edition :
Call Number : 005.8 SIN b
Availability : 1 copies available for loan
Information governance : concepts, strategies and best practices
Edition : 2nd
Call Number : 658.4 SMA i
Availability : 1 copies available for loan
Demystifying internet of things security : successful IoT device / edge and platform security development
Edition : PDF ed.
Call Number : 005.8 CHE d
Availability : 1 copies available for loan
Penetration testing for dummies
Edition : PDF ed.
Call Number : 005.8 SHI p
Availability : 1 copies available for loan
Cryptography made simple
Edition : PDF ed.
Call Number : 005.8 NIG c
Availability : 1 copies available for loan
Guide to computer network security
Edition : 4th ed. PDF ed.
Call Number : 005.8 KIZ g
Availability : 1 copies available for loan
Hands-on machine learning for cybersecurity : safeguard your system by making your machines intelligent using the Python ecosystem
Edition :
Call Number : 005.8 HAL h
Availability : none copy available
Hacking website : menemukan celah keamanan & melindungi website dari serangan hacker
Edition :
Call Number : 005.8 KID h
Availability : 2 copies available for loan
Certified information systems security professional : official study guide
Edition : 8th ed.
Call Number : 005.8 CHA c
Availability : 1 copies available for loan
Effective cyber security : a guide to using best practices and standards
Edition :
Call Number : 005.8 STA e
Availability : 1 copies available for loan
International conference on data management
Edition :
Call Number : P 004 INT
Availability : 1 copies available for loan
The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of big brother and big data
Edition :
Call Number : 005.8 MIT a
Availability : 1 copies available for loan
CISA : certified information systems auditor : study guide
Edition : 4th ed.
Call Number : 005.8076 CAN c
Availability : 1 copies available for loan
Research methods for cyber security
Edition :
Call Number : 005.8072 EDG r
Availability : 1 copies available for loan
Audio content security : attack analysis on audio watermarking
Edition :
Call Number : 005.8 GHO a
Availability : 1 copies available for loan
Cryptography and network security
Edition : International ed.
Call Number : 005.8 FOR c
Availability : 1 copies available for loan
Cryptography and network security : principles and practice
Edition : 6th ed.
Call Number : 005.8 STA c
Availability : 1 copies available for loan
Computer security : principles and practice
Edition : 2nd ed.
Call Number : 005.8 STA cs
Availability : 1 copies available for loan
iPad geekery : 50 insanely cool hacks and mods for your apple tablet
Edition :
Call Number : 005.8 HAR i
Availability : 1 copies available for loan
Core software security : security at the source
Edition :
Call Number : 005.8 RAN c
Availability : 1 copies available for loan
Hacking : basic security, penetration testing, and how to hack
Edition :
Call Number : 005.8 SHA h
Availability : 2 copies available for loan
Computer security : principles and practice
Edition : 3rd ed.
Call Number : 005.8 STA cs 2015
Availability : 1 copies available for loan
Security and privacy in internet of things (IoTs) : models, algorithms, and implementations
Edition :
Call Number : 005.8 SEC
Availability : 1 copies available for loan
Ethical hacking and penetration testing guide
Edition :
Call Number : 005.8 BAL e
Availability : 1 copies available for loan
Cloud computing security : foundations and challenges
Edition :
Call Number : 005.8 CLO
Availability : 1 copies available for loan
The complete guide to cybersecurity risks and controls
Edition :
Call Number : 005.8 KOH c
Availability : 1 copies available for loan
Kriptografi untuk keamanan jaringan dan implementasinya dalam bahasa Java
Edition :
Call Number : 005.8 SAD k
Availability : 1 copies available for loan
CASP CompTIA advanced security practitioner certification study guide (Exam CAS-001)
Edition :
Call Number : 005.8076 CON c
Availability : 3 copies available for loan
Search Result
Found 42 from your keywords: Subject : "Computer security"
Query took 0.07059 second(s) to complete
Information
Matana University Online Public Access Catalog. For assistance, contact your librarian by email [email protected].