Welcome
user_choices_background_image
Welcome
login container bottom
Search Libraries Catalogue
Duplicate Items
Add to My List

Print
Sorts and Limits

Results 1 - 15 of 15
1. Title: Black Hat Go : Go programming for hackers and pentesters / by Tom Steele, Chris Patten, and Dan Kottmann.
Author: Steele, Tom (Security Consultant),
Publication: No Starch Press, San Francisco : 2020.
2. Title: Enhancing the performance of detecting phishing website rate / by Shireen Khalil Mosa Riaty ; supervised by Ahmad Sharieh, co-supervisor Hamed al-Bdoor.
تحسين معدل الأداء في الكشف عن مواقع التصيد
Author: Riaty, Shireen Khalil Mousa.
Publication: 2016.
3. Title: Penetration testing : a hands-on introduction to hacking / by Georgia Weidman.
Kali Linux.
Author: Weidman, Georgia.
Publication: No Starch Press, San Francisco : [2014]
4. Title: Metasploit : the penetration tester's guide / by David Kennedy [and others].
Metasploit (Electronic resource)
Metasploit (Electronic resource)
Metasploit (Electronic resource)
Publication: No Starch Press, San Francisco : �2011.
5. Title: Practical IoT hacking : the definitive guide to attacking the internet of things / by Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, and Beau Woods.
Author: Chantzis, Fotios,
Publication: No Starch Press, Inc., San Francisco : [2021]
6. Title: Fast pattern matching for intrusion detection using exclusion and inclusion filters / by Duaa Waleed al-Ansari ; supervised by Monther al-Dwairi.
مضاهاة نماذج سريعة للكشف عن الاختراق بإستخدام مرشحات الاقصاء والشمول
Author: al-Ansari, Duaa Walid.
Publication: 2011.
7. Title: A REPUTATION SYSTEM TO DETECT DGA-BASED BOTNETS USING DNS TRAFFIC MINING IN MONITORED NETWORKS / by Raeda Freehat, ; Advisor Najib A. Kofahi.
Author: Freehat, Raeda
Publication: 2018
8. Title: Hands-on ethical hacking and network defense / Michael T. Simpson, Nicholas Antill.
Author: Simpson, Michael T., 1954-
Publication: Cengage Learning, Australia ; Boston, MA : 2017.
Edition: Third edition.
9. Title: Real-world bug hunting : a field guide to web hacking / by Peter Yaworski.
Author: Yaworski, Peter,
Publication: No Starch Press, San Francisco : 2019.
10. Title: FLAME clustering and cuckoo search selection for building a new intrusion detection model / by Kawthar Ahmad alZboon ; supervised by Dr. Jehad Q. al-Nihoud, Dr. Wafa' S. al-Sharafat.
اللهب العنقودية واختيار البحث الواقوق لبناء نموذج جديد لكشف التسلل
Author: alzboon, Kawthar Ahmad,
Publication: 2017.
 
 
Results 1 - 15 of 15
Duplicate Items
Add to My List

Print
Sorts and Limits