Your search returned 61 results.

41. Books
Advanced penetration testing : hacking the world's most secure networks / Wil Allsopp.

by Allsopp, Wil [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: [Place of publication not identified] : Wiley, 2017Availability: Items available for loan: National University - Manila (1). Collection(s): Computer Science Call number: GC QA 76.9 .A45 2017.

42. Books
Hands-on network forensics : investigate network attacks and find evidence using common network forensic tools / Nipun Jaswal

by Jaswal, Nipun [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Birmingham : Packt Publishing Ltd, c2019Availability: Items available for loan: National University - Manila (2). Collection(s): Gen. Ed. - CCIT Call number: GC TK 5105.59 .J37 2019 c.1.

43. Books
Mastering malware analysis : the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks / Alexey Kleymenov and Amr Thabet

by Kleymenov, Alexey [author] | Thabet, Amr [co-author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Birmingham : Packt Publishing, Limited, c2019Availability: Items available for loan: National University - Manila (2). Collection(s): Digital Forensic Call number: GC QA 76.76.C68 .K58 2019.

44. Books
Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows Malware / Monnappa K. A

by Monnappa, K. A [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Birmingham : Packt Publishing Ltd, c2018Availability: Items available for loan: National University - Manila (2). Collection(s): Digital Forensic Call number: GC QA 76.76.C68 .K3l 2018 c.1.

45. Books
Digital forensics basics : a practical guide using Windows OS / Nihad A. Hassan.

by Hassan, Nihad A [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: [Berkeley, California] : Apress, 2019Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC QA 76.9.A25 .H37 2019.

46. Books
Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux tools / Shiva V.N. Parasram.

by Parasram, Shiva V. N [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Birmingham, UK : Packt Publishing, 2017Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC QA 76.9.A25 .P37 2017.

47. Books
Foundations of information security : a straightforward introduction / Jason Andress

by Andress, Jason [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: San Francisco, CA : No Starch Press, c2019Availability: Items available for loan: National University - Manila (2). Collection(s): Accounting Technology / Accounting Information System Call number: GC QA 76.9.A25 .A54 2019.

48. Books
Spotting the trend / Jenny Chang

by Chang, Jenny [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: United States : Trend Micro Inc., c2014Availability: Items available for loan: National University - Manila (1). Collection(s): General Education Call number: GC QA 76.9.A25 .C43 2014.

49. Books
IT governance : an international guide to data security and ISO27001/ISO27002 / Alan Calder and Steve Watkins

by Calder, Alan [author] | Watkins, Steve [co-author].

Edition: 7th Edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: London : Kogan Page, c2020Availability: Items available for loan: National University - Manila (1). Collection(s): Doctor in Information Technology Call number: GC QA 76.9.A25 .C35 2020.

50. Books
Cyber privacy : who has your data and why you should care / April Falcon Doss

by Doss, April Falcon [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Dallas, TX : BenBella Books, Inc., c2020Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC JC 596.2.U5 .D67 2020.

51. Books
Practical threat intelligence and data-driven thread hunting : a hands-on guide to threat hunting with the ATT&CK framework and open source tools / Valentina Costa-Gazcon

by Gazcon, Valentina Costa- [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Birmingham, England : Packt Publishing, c2021Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC TK 5105.875.I57 .G39 2021.

52. Books
Malware analysis techniques : tricks for the triage of adversarial software / Dylan Barker

by Barker, Dylan [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Birmingham : Packt Publishing Ltd, c2021Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC QA 76.76 .B37 2021.

53. Books
A Practical guide to digital forensics investigations / Darren R. Hayes

by Hayes, Darren R [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Hoboken, NJ : Pearson, c2021Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC HV 8079 .H39 2021.

54. Books
Digital forensics explained / Edited by Greg Gogolin

by Gogolin, Greg [author] | Gogolin, Greg [editor].

Edition: Second EditionMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boca Raton : CRC Press, c2021Availability: Items available for loan: National University - Manila (1). Collection(s): Computer Science Call number: GC HV 8079.C65 .D54 2021.

55. Books
Ghidra software reverse engineering for beginners : Analyze, identify, and avoid malicious code and potential threats in your networks and systems / A.P. David

by David, A.P [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Birmingham : Packt Publishing, Ltd., c2020Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC QA 76.758 .D38 2020.

56. Books
The Art of mac malware : the guide to analyzing malicious software / Partrick Wardle

by Wardle, Partrick [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: San Francisco : No Starch Press, c2022Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC QA 76.774.M33 .W37 2022.

57. Books
Information security policies, procedures, and standards : a practitioner's reference / Douglas J. Landoll

by Landoll, Douglas J [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: United States : CRC Press, c2016Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC HF 5548.37 .L36 2016.

58. Books
Mastering windows security and hardening : secure and protect your Windows environment from intruders, malware attacks, and other cyber threats / Mark Dunkerley and Matt Tumbarello

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Birmingham, UK : Packt Publishing, c2020Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC QA 76.9.A25 .D86 2020.

59. Books
Infosec strategies and best practices : gain proficiency in information security using expert-level strategies and best practices / Joseph MacMillan

by MacMillan, Joseph [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Birmingham : Packt Publishing Ltd, c2021Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC TK 5105.59 .M33 2021.

60. Books
Cybersecurity for dummies / Joseph Steinberg

by Steinberg, Joseph [author].

Series: For dummiesEdition: 2nd Edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Hoboken, NJ : John Wiley & Sons, Inc., c2022Availability: Items available for loan: National University - Manila (1). Collection(s): Political Science Call number: GC TK 5105.5 .S74 2022.

© 2021 NU LRC. All rights reserved.Privacy Policy I Powered by: KOHA