Your search returned 978 results. Subscribe to this search

Not what you expected? Check for suggestions
|
1. BOOK Windows forensic analysis toolkit : advanced analysis techniques for Windows 7 / Harlan Carvey ; technical editor, Jennifer Kolde.

by Carvey, Harlan A.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Waltham, MA : Syngress, c2012Availability: Items available for loan: المكتبة العامة بمهد الذهب [Call number: 510.92] (1).

2. BOOK Windows registry forensics : advanced digital forensic analysis of the Windows registry / Harlan Carvey.

by Carvey, Harlan A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington, MA : Syngress, 2011Availability: Items available for loan: المكتبة العامة بمهد الذهب [Call number: 363.2562 CHW] (1).

3. BOOK Computer security : principles and practice / William Stallings, Lawrie Brown ; with contributions by Mick Bauer, Michael Howard.

by Stallings, William | Brown, Lawrie.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston : Pearson, c2012Availability: No items available

4. BOOK Computer security : principles and practice / William Stallings, Lawrie Brown ; with contributions by Mick Bauer, Michael Howard.

by Stallings, William | Brown, Lawrie.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston : Pearson, 2010Availability: Items available for loan: المكتبة العامة بالقريات [Call number: 005.8 SWC] (2). Items available for reference: المكتبة العامة بالقريات [Call number: 005.8 SWC] (1).

5. BOOK The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / Dr. Patrick Engebretson, David Kennedy, Technical Editor.

by Engebretson, Pat (Patrick Henry), 1974-.

Edition: Second Edition.Material type: book Book; Format: print ; Literary form: Not fiction Availability: Items available for loan: المكتبة العامة بمهد الذهب [Call number: 005.8 EPB] (1).

6. BOOK Computer forensics jumpstart / Michael Solomon, Diane Barrett, Neil Broom.

by Solomon, Michael, (Michael G.), 1963- | Barrett, Diane | Broom, Neil.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco : Sybex, c2005Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: المكتبة العامة بحوطة بني تميم [Call number: 005.8 S M C] (3).

7. BOOK The basics of information security : understanding the fundamentals of InfoSec in theory and practice / Jason Andress.

by Andress, Jason.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam ; Boston : Syngress, 2011Availability: Items available for loan: المكتبة العامة بدومة الجندل [Call number: 005.8 AJB] (2). Items available for reference: المكتبة العامة بدومة الجندل [Call number: 005.8 AJB] (1).

8. Principles of information security / Michael E. Whitman and Herbert J. Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston, Mass. : Thomson Course Technology, c2009Availability: No items available

9. BOOK Computer security fundamentals / Chuck Easttom.

by Easttom, Chuck.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis, Ind. : Pearson, c2012Availability: Items available for loan: المكتبة العامة بالقريات [Call number: 005.8 ECC] (2). Items available for reference: المكتبة العامة بالقريات [Call number: 005.8 ECC] (1).

10. BOOK SQL injection attacks and defense / Justin Clarke.

by Clarke, Justin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Waltham, MA : Elsevier, c2012Availability: Items available for loan: المكتبة العامة بمهد الذهب [Call number: 005.8 CJS] (1).

11. BOOK Advanced persistent threat : understanding the danger and how to protect your organization / Dr. Eric Cole.

by Cole, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Availability: Items available for loan: المكتبة العامة بمهد الذهب [Call number: 005.8 CEA] (1).

12. BOOK The basics of information security : understanding the fundamentals of InfoSec in theory and practice / Jason Andress.

by Andress, Jason.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam ; Boston : Syngress, c2011Availability: Items available for loan: المكتبة العامة بمهد الذهب [Call number: 005.8 AJB] (1).

13. BOOK Security automation essentials : streamlined enterprise security management & monitoring with SCAP / Greg Witte, Melanie Cook, Matt Kerr, Shane Shaffer.

by Witte, Greg.

Material type: book Book; Format: print ; Literary form: Not fiction Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: المكتبة العامة بمهد الذهب [Call number: 005.8 WGC] (1).

14. BOOK Network security : a beginner's guide / Eric Maiwald.

by Maiwald, Eric.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill, 2013Availability: Items available for loan: المكتبة العامة بمهد الذهب [Call number: 005.8 MEN] (1).

15. BOOK Hacking exposed 7 : network security secrets & solutions / Stuart Mcclure, Joel Scambray, George Kurtz.

by McClure, Stuart | Mcclure, Stuart | Scambray, Joel | Kurtz, George.

Material type: book Book; Format: print ; Literary form: Not fiction Availability: Items available for loan: المكتبة العامة بمهد الذهب [Call number: 005.8 MSH] (1).

16. BOOK FISMA and the risk management framework [electronic resource] : the new practice of federal cyber security / Stephen D. Gantz, Daniel R. Philpott ; Darren Windham, technical editor.

by Gantz, Stephen D | Philpott, Daniel R | Windham, Darren.

Source: Safari Technical Books (Current File)Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Amsterdam ; Boston, MA : Elsevier/Syngress, c2013Online access: Full text available from Safari Technical Books (Current File) Availability: Items available for loan: المكتبة العامة بمهد الذهب [Call number: 005.8 GSF] (1).

17. BOOK Low tech hacking : street smarts for security professionals / Jack Wiles ... [et al.].

by Wiles, Jack | Gudaitis, Terry | Jabbusch, Jennifer | Rogers, Russ | Lowther, Sean.

Material type: book Book; Literary form: Not fiction Publisher: Waltham, Mass. : Syngress, c2012Availability: Items available for loan: المكتبة العامة بمهد الذهب [Call number: 005.8 LOT] (1).

18. BOOK Malware, rootkits & botnets : a beginner's guide / Christopher C. Elisan.

by Elisan, Christopher C. QA76.76.C68.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York. : McGraw-Hill, c2013Other title: Malware, rootkits and botnets.Availability: Items available for loan: المكتبة العامة بمهد الذهب [Call number: 005.8 ECM] (1).

19. BOOK Secure software design / Theodor Richardson, Charles N. Thies.

by Richardson, Theodor | Thies, Charles.

Material type: book Book; Format: print ; Literary form: Not fiction ; Audience: General; Publisher: Burlington, MA : Jones & Bartlett Learning, 2013Availability: Items available for loan: المكتبة العامة بأملج [Call number: 005.8 RTS] (1). Items available for reference: المكتبة العامة بأملج [Call number: 005.8 RTS] (1), المكتبة العامة بالطائف [Call number: 005.8 RTS] (1).

20. BOOK Network intrusion detection and prevention : concepts and techniques / Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee.

by Ghorbani, Ali, 1954- | Lu, Wei, 1980- | Tavallaee, Mahbod.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Springer, c2010Availability: Items available for loan: المكتبة العامة بالقيصومة [Call number: 005.8 GAN] (3).

Not finding what you're looking for?