Search Results - Rogers, Russ
- Showing 1 – 15 results of 15
-
1Techno Security's Guide to Managing Risks for IT Managers, Auditors, and InvestigatorsPublished 2011Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
2The hacker's guide to OS X: exploiting OS X from the root-upPublished 2013Other Authors: “…Rogers, Russ…”
Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
3Coding for penetration testers: building better toolsPublished 2012Other Authors: “…Rogers, Russ…”
Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
4Low tech hacking: street smarts for security professionalsPublished 2012Other Authors: “…Rogers, Russ…”
Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
5Cyber warfare: techniques, tactics and tools for security practitionersPublished 2011Other Authors: “…Rogers, Russ…”
Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
6Nessus network auditingPublished 2008Other Authors: “…Rogers, Russ…”
Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
7Syngress IT security project management handbookPublished 2006Other Authors: “…Rogers, Russ…”
Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
8Hacking a terror network: the silent threat of covert channelsPublished 2005Call Number: Loading…
Located: Loading…Electronic eBook Loading… -
9Hacking a terror network: the silent threat of covert channelsPublished 2005Call Number: Loading…
Located: Loading…Electronic eBook Loading… -
10Security assessment: case studies for implementing the NSA lAMPublished 2004Call Number: Loading…
Located: Loading…
Electronic eBook Loading… -
11Hacking a terror network: the silent threat of covert channelsPublished 2005Call Number: Loading…
Located: Loading…Electronic eBook Loading… -
12Hacking a terror network: the silent threat of covert channelsPublished 2005Call Number: Loading…
Located: Loading…
Electronic eBook Loading… -
13Security assessment: case studies for implementing the NSA lAMPublished 2004Call Number: Loading…
Located: Loading…
Electronic eBook Loading… -
14Hacking a terror network: the silent threat of covert channelsPublished 2005Call Number: Loading…
Located: Loading…
Electronic eBook Loading… -
15Network security evaluation: using the NSA IEMPublished 2005Other Authors: “…Rogers, Russ…”
Call Number: Loading…
Located: Loading…
Book Loading…