385 items
Title | Author | Format | Call No. |
---|---|---|---|
The Net Delusion The Dark Side of Internet Freedom | Morozov, Evgeny | Book, 2011 | 303.4833 M8295n |
Linux Firewalls Attack Detection and Response With Iptables, Psad, and Fwsnort | Rash, Michael | Book, 2007 | 005.8 R1835L |
The Net Delusion The Dark Side of Internet Freedom | Morozov, Evgeny | eBook, 2011 | EBOOK OVERDRIVE |
Single Sign-on and Passwordless Authentication An Overview | Downloadable Video, 2022 | EVIDEO OREILLY | |
Git Schnelleinstieg Versionsverwaltung lernen in 14 Tagen : einfach und ohne Vorkenntnisse | Vijayakumaran, Sujeevan | eBook, 2022 | EBOOK OREILLY |
ASP.NET Core Identity Authentication and Authorization | Downloadable Video, 2021 | EVIDEO OREILLY | |
Pro ASP.NET Core Identity Under the Hood With Authentication and Authorization in ASP.NET Core 5 and 6 Applications | Freeman, Adam | eBook, 2021 | EBOOK OREILLY |
My Data My Privacy My Choice A Step-by-Step Guide to Secure Your Personal Data and Reclaim Your Online Privacy! | Srivastwa, Rohit | eBook, 2020 | EBOOK SKILLPORT |
Microservices Security in Action | Siriwardena, Prabath | eBook, 2020 | EBOOK OREILLY |
Microservices Security in Action | Siriwardena, Prabath | Downloadable Audiobook, 2020 | EAUDIOBOOK OREILLY |
Mastering Metasploit - Fourth Edition | Jaswal, Nipun | eBook, 2020 | EBOOK OREILLY |
Developing Applications With Azure Active Directory Principles of Authentication and Authorization for Architects and Developers | Mayank, Manas | eBook, 2019 | EBOOK SKILLPORT |
Becoming the Hacker The Playbook for Getting Inside the Mind of An Attacker | Pruteanu, Adrian | eBook, 2019 | EBOOK OREILLY |
Versionsverwaltung mit Git | Vijayakumaran, Sujeevan | eBook, 2019 | EBOOK OREILLY |
Kali Linux, An Ethical Hacker's Cookbook Practical Recipes That Combine Strategies, Attacks, and Tools for Advanced Penetration Testing | Sharma, Himanshu | eBook, 2019 | EBOOK OREILLY |
Managing SQL Server Encryption Certificates Getting Started With SQL Server Encryption | Blinn, Eric | Downloadable Video, 2019 | EVIDEO OREILLY |
Metasploit Penetration Testing Cookbook Evade Antiviruses, Bypass Firewalls, and Exploit Complex Environments With the Most Widely Used Penetration Testing Framework | Teixeira, Daniel | eBook, 2018 | EBOOK OREILLY |
Hands-on Penetration Testing on Windows Unleash Kali Linux, PowerShell, and Windows Debugging Tools for Security Testing and Analysis | Bramwell, Phil | eBook, 2018 | EBOOK OREILLY |
Practical Network Scanning Capture Network Vulnerabilities Using Standard Tools Such as Nmap and Nessus | Chauhan, Ajay Singh | eBook, 2018 | EBOOK OREILLY |
Kali Linux Tutorial for Beginners | Naja, Tarek | Downloadable Video, 2018 | EVIDEO OREILLY |
Mastering Metasploit Take your Penetration Testing and IT Security Skills to A Whole New Level With the Secrets of Metasploit | Jaswal, Nipun | eBook, 2018 | EBOOK OREILLY |
Learn Git in 3 Hours | Conyers, Ross | Downloadable Video, 2018 | EVIDEO OREILLY |
Network Scanning Cookbook Practical Network Security Using Nmap and Nessus 7 | Sairam, Jetty | eBook, 2018 | EBOOK OREILLY |
Securing the Perimeter Deploying Identity and Access Management With Free Open Source Software | Schwartz, Michael | eBook, 2018 | EBOOK OREILLY |
Penetration Tester's Open Source Toolkit, Fourth Edition | Faircloth, Jeremy | eBook, 2017 | EBOOK SKILLPORT |