Your search returned 10 results.

1. Books
Honds-on peretrationh testing on windows : unleash Kali Linux, PowerShell and windows debugging tools for security testing and analysis / Phil Bramwell

by Bramwell, Phil [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: United Kingdom : Packt Publishing Ltd., 2018Availability: Items available for loan: National University - Manila (1). Collection(s): Computer Science Call number: GC QA 76.9.A25 .B73 2018.

2. Books
Hands-on reinforcement learning with Python : master reinforcement and deep reinforcement learning using openAI gym and tensorflow / Sudharsan Ravichandiran

by Ravichandiran, Sudharsan [author] | Ravichandiran, Sudharsan [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Birmingham : Packt Publishing Ltd, c2018Availability: Items available for loan: National University - Manila (1). Collection(s): Machine Learning Call number: GC Q 325.5 .R38 2018.

3. Books
Hands-on network forensics : investigate network attacks and find evidence using common network forensic tools / Nipun Jaswal

by Jaswal, Nipun [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Birmingham : Packt Publishing Ltd, c2019Availability: Items available for loan: National University - Manila (2). Collection(s): Gen. Ed. - CCIT Call number: GC TK 5105.59 .J37 2019 c.1.

4. Books
Deep reinforcement learning hands-on : apply modern RL methods, with deep Q-networks, value iteration, policy gradients, TRPO, AlphaGo Zero and more / Maxim Lapan

by Lapan, Maxim [author] | Lapan, Maxim [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Birmingham : Packt Publishing Ltd., c2018Availability: Items available for loan: National University - Manila (1). Collection(s): Machine Learning Call number: GC Q 325.5 .L37 2018.

5. Books
Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows Malware / Monnappa K. A

by Monnappa, K. A [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Birmingham : Packt Publishing Ltd, c2018Availability: Items available for loan: National University - Manila (2). Collection(s): Digital Forensic Call number: GC QA 76.76.C68 .K3l 2018 c.1.

6. Books
Malware analysis techniques : tricks for the triage of adversarial software / Dylan Barker

by Barker, Dylan [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Birmingham : Packt Publishing Ltd, c2021Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC QA 76.76 .B37 2021.

7. Books
101 UX principles : actionable solutions for product design success / Will Grant

by Grant, Will [author].

Edition: 2nd EditionMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Birmingham, UK : Packt Publishing Ltd., c2022Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC QA 76.9.U83 .G73 2022.

8. Books
Ghidra software reverse engineering for beginners : Analyze, identify, and avoid malicious code and potential threats in your networks and systems / A.P. David

by David, A.P [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Birmingham : Packt Publishing, Ltd., c2020Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC QA 76.758 .D38 2020.

9. Books
Learn wireshark : a definitive guide to expertly analyzing protocols and troubleshooting networks using wireshark / Lisa Bock

by Bock, Lisa [author].

Edition: Second Edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Birmingham, UK : Packt Publishing Ltd., c2022Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC QA 76.9.A25 .B63 2022.

10. Books
Infosec strategies and best practices : gain proficiency in information security using expert-level strategies and best practices / Joseph MacMillan

by MacMillan, Joseph [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Birmingham : Packt Publishing Ltd, c2021Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC TK 5105.59 .M33 2021.

© 2021 NU LRC. All rights reserved.Privacy Policy I Powered by: KOHA