//]]>
Item type | Location | Call Number | Status | Notes | Date Due |
---|---|---|---|---|---|
Book | AUM Main Library English Collections Hall | 005.8 V385 (Browse Shelf) | Available | JBC/2011/15511 | |
Book | AUM Main Library English Collections Hall | 005.8 V385 (Browse Shelf) | Available | JBC/2011/15511 |
005.8 T364Cybersecurity fundamentals : | 005.8 T364Cybersecurity fundamentals : | 005.8 V385Defense against the black arts : | 005.8 V385Defense against the black arts : | 005.8 V659Professional rootkits / | 005.8 W614Principles of information security / |
Includes index.
Hacking Windows OS -- Obtaining Windows passwords -- Imaging and extraction -- Bypassing web filters -- Manipulating the Web -- Finding it all on the net -- Research time -- Capturing network traffic -- Research time: finding the vulnerabilities -- Metasploit -- Other attack tools -- Social engineering with Web 2.0 -- Hack the Macs -- Wireless hacking.
There are no comments for this item.