Home Advanced Search

Advanced Search - Page 1

Passive Python network mapping : P2NMAP
Passive Python network mapping : P2NMAP
  • EPUB
  • English
  • Year: 2015
  • Author: Hosmer, Chet; Kessler, Gary C
Digital forensics : threatscape and best practices
Digital forensics : threatscape and best practices
  • PDF
  • English
  • Year: 2015
  • Author: Sammons, John
Meeting People via Wi: Fi and Bluetooth
Meeting People via Wi: Fi and Bluetooth
  • PDF
  • English
  • Year: 2016
  • Author: Dalziel, Henry; Schroeder, Joshua
Cyber Security Awareness for CEOs and Management
Cyber Security Awareness for CEOs and Management
  • PDF
  • English
  • Year: 2016
  • Author: Dalziel, Henry; Willson, David
Theoretical and Experimental Methods for Defending Against DDOS Attacks
Theoretical and Experimental Methods for Defending Against DDOS Attacks
  • PDF
  • English
  • Year: 2016
  • Author: Amiri, Iraj Sadegh; Soltanian, Mohammad Reza Khalifeh
Dissecting the hack : the v3rb0ten network
Dissecting the hack : the v3rb0ten network
  • PDF
  • English
  • Year: 2015
  • Author: Baskin, Brian; Martin, Brian; Sims, Kristin; Street, Jayson E
Security controls evaluation, testing, and assessment handbook
Security controls evaluation, testing, and assessment handbook
  • PDF
  • English
  • Year: 2015
  • Author: Johnson, Leighton
Security controls evaluation, testing, and assessment handbook
Security controls evaluation, testing, and assessment handbook
  • PDF
  • English
  • Year: 2016
  • Author: Johnson, Leighton
Digital forensics: threatscape and best practices
Digital forensics: threatscape and best practices
  • EPUB
  • English
  • Year: 2016;2015
  • Author: Sammons, John