Refine your search

Your search returned 194 results.

Not what you expected? Check for suggestions
Sort
Results
21.
Fuzzing for software security testing and quality assurance Ari Takanen, Jared DeMott, Charlie Miller, Atte Kettunen by Series: Artech House information security and privacy series
Edition: 2nd ed.
Material type: Text Text
Publication details: Boston : Artech House, c2018
Online resources:
Availability: Items available for loan: University of Wollongong in Dubai (1)Call number: 005.8 TA FU.

22.
Practical security : simple practices for defending your systems Roman Zabicki by
Material type: Text Text
Publication details: Raleigh, North Carolina : The Pragmatic Bookshelf, c2019
Online resources:
Availability: Items available for loan: University of Wollongong in Dubai (1)Call number: 005.8 ZA PR.

23.
CompTIA security+ all-in-one exam guide, (Exam SY0-501) Wm. Arthur Conklin, Gregory White, Chuck Cothren, Roger L. Davis, Dwayne Williams by
Edition: 5th ed.
Material type: Text Text
Publication details: New York : McDraw-Hill Eduction, c2018
Online resources:
Availability: Items available for loan: University of Wollongong in Dubai (1)Call number: 005.8 CO CO.

24.
Managing cyber risk Ariel Evans by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, NY : Routledge, 2019
Availability: Items available for loan: University of Wollongong in Dubai (1)Call number: 658.478 EV MA.

25.
Hacking for dummies / Kevin Beaver, CISSP by
Edition: 6th ed.
Material type: Text Text
Publication details: Hoboken, NJ : For Dummies, 2018
Online resources:
Availability: Not available: University of Wollongong in Dubai: Ordered (1).

26.
Principles of information security Michael E. Whitman, Herbert J. Mattord by
Edition: 6th ed.
Material type: Text Text
Publication details: Boston, MA : Cengage Learning, c2018
Online resources:
Availability: Items available for loan: University of Wollongong in Dubai (2)Call number: 005.8 WH PR, ...

27.
Management of information security Michael E. Whitman, Herbert J. Mattord by
Edition: 6th ed.
Material type: Text Text
Publication details: Boston, Massachusetts : Cengage Learning, c2019
Online resources:
Availability: Items available for loan: University of Wollongong in Dubai (3)Call number: 658.478 WH MA, ...

28.
Penetration testing : a hands-on introduction to hacking Georgia Weidman by
Material type: Text Text
Publication details: San Francisco : No Starch Press, c2014
Online resources:
Availability: Items available for loan: University of Wollongong in Dubai (3)Call number: 005.8092 WE PE, ...

29.
Computer security : principles and practice William Stallings, Lawrie Brown by
Edition: 4th ed.
Publication details: New York, NY : Pearson, c2018
Online resources:
Availability: Items available for loan: University of Wollongong in Dubai (4)Call number: 005.8 ST CO, ...

30.
Research methods for cyber security Thomas W. Edgar, David O. Manz by
Material type: Text Text
Publication details: Cambridge, MA : Syngress, c2017
Online resources:
Availability: Items available for loan: University of Wollongong in Dubai (1)Call number: 005.8 ED RE.

31.
Handbook of e-business security / edited by Joao Manuel R.S. Tavares ... [et al.] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : CRC Press, c2019
Availability: Items available for loan: University of Wollongong in Dubai (1)Call number: 658.478 HA ND.

32.
Investigation procedures and response EC-Council Press Series: Computer forensics, bk. 1
Edition: 2nd ed.
Publication details: Boston : Cengage, c2017
Other title:
  • Computer forensics : investigation procedures and response
Online resources:
Availability: Items available for loan: University of Wollongong in Dubai (1)Call number: 363.25​968076 IN VE.

33.
Fundamentals of network forensics : a research perspective R.C. Joshi, Emmanuel S. Pilli by Series: Computer Communications and Networks
Material type: Text Text
Publication details: London : Springer, c2016
Availability: Items available for loan: University of Wollongong in Dubai (1)Call number: 004.6 JO FU.

34.
Security strategy : from requirements to reality Bill Stackpole and Eric Oksendahl by
Material type: Text Text
Publication details: Boca Raton, Fla. : CRC Press : c2011
Online resources:
Availability: Items available for loan: University of Wollongong in Dubai (1)Call number: 005.8 ST SE.

35.
36.
Hands-on ethical hacking and network defense / Michael T Simpson; Nicholas Antill by
Material type: Text Text
Publication details: Australia : Cengage Learning, c2017
Online resources:
Availability: Items available for loan: University of Wollongong in Dubai (1)Call number: 005.8 SI HA.

37.
Attribute-based access control / Vincent Hu ... [et al.] by
Publication details: Boston : Artech House, c2018
Online resources:
Availability: Items available for loan: University of Wollongong in Dubai (1)Call number: 005.8 HU AT.

38.
Ransomware : defending against digital extortion Allan Liska and Timothy Gallo by
Material type: Text Text
Publication details: Sebastopol : O' Reilly Media : c2016
Online resources:
Availability: Items available for loan: University of Wollongong in Dubai (1)Call number: 005.88 LI RA.

39.
40.
The Kish cypher : the story of KLJN for unconditional security Laszlo B. Kish by
Material type: Text Text
Publication details: New Jersey : World Scientific, c2017
Online resources:
Availability: Items available for loan: University of Wollongong in Dubai (1)Call number: 005.8 KI KI.

Pages