Welcome
Copyright © SirsiDynix. All rights reserved.
(Build horizon-8.0.1.5407)
Center Of Excellence for Jordanian Public University Library System (COE-JOPULS)
العربية (السعودية)
English (United States)
Log in
Help
Welcome
Jordanian Union Catalogue
360 Search
Search Libraries Catalogue
Simple
Advanced
Power
Community Resource
Search History
My List
My Account
Search
Options
Refine
Start Over
Show details
Hide details
Duplicate Items
Add to My List
Print
Sorts and Limits
Sorts:
None
Author
Publication Date
Publisher
Subject
Title
Select All
Results 1 - 15 of 15
1
.
Title:
Black Hat Go : Go programming for hackers and pentesters / by Tom Steele, Chris Patten, and Dan Kottmann.
Author:
Steele, Tom (Security Consultant),
Publication:
No Starch Press, San Francisco : 2020.
2
.
Title:
Enhancing the performance of detecting phishing website rate / by Shireen Khalil Mosa Riaty ; supervised by Ahmad Sharieh, co-supervisor Hamed al-Bdoor.
تحسين معدل الأداء في الكشف عن مواقع التصيد
Author:
Riaty, Shireen Khalil Mousa.
Publication:
2016.
3
.
Title:
Penetration testing : a hands-on introduction to hacking / by Georgia Weidman.
Kali Linux.
Author:
Weidman, Georgia.
Publication:
No Starch Press, San Francisco : [2014]
4
.
Title:
Metasploit : the penetration tester's guide / by David Kennedy [and others].
Metasploit (Electronic resource)
Metasploit (Electronic resource)
Metasploit (Electronic resource)
Publication:
No Starch Press, San Francisco : �2011.
5
.
Title:
Practical IoT hacking : the definitive guide to attacking the internet of things / by Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, and Beau Woods.
Author:
Chantzis, Fotios,
Publication:
No Starch Press, Inc., San Francisco : [2021]
6
.
Title:
Fast pattern matching for intrusion detection using exclusion and inclusion filters / by Duaa Waleed al-Ansari ; supervised by Monther al-Dwairi.
مضاهاة نماذج سريعة للكشف عن الاختراق بإستخدام مرشحات الاقصاء والشمول
Author:
al-Ansari, Duaa Walid.
Publication:
2011.
7
.
Title:
A REPUTATION SYSTEM TO DETECT DGA-BASED BOTNETS USING DNS TRAFFIC MINING IN MONITORED NETWORKS / by Raeda Freehat, ; Advisor Najib A. Kofahi.
Author:
Freehat, Raeda
Publication:
2018
8
.
Title:
Hands-on ethical hacking and network defense / Michael T. Simpson, Nicholas Antill.
Author:
Simpson, Michael T., 1954-
Publication:
Cengage Learning, Australia ; Boston, MA : 2017.
Edition:
Third edition.
9
.
Title:
Real-world bug hunting : a field guide to web hacking / by Peter Yaworski.
Author:
Yaworski, Peter,
Publication:
No Starch Press, San Francisco : 2019.
10
.
Title:
FLAME clustering and cuckoo search selection for building a new intrusion detection model / by Kawthar Ahmad alZboon ; supervised by Dr. Jehad Q. al-Nihoud, Dr. Wafa' S. al-Sharafat.
اللهب العنقودية واختيار البحث الواقوق لبناء نموذج جديد لكشف التسلل
Author:
alzboon, Kawthar Ahmad,
Publication:
2017.
Results 1 - 15 of 15
Duplicate Items
Add to My List
Print
Sorts and Limits
Sorts:
None
Author
Publication Date
Publisher
Subject
Title