Asia Pacific University Library catalogue


Your search returned 22 results.

|
1.
Network security : a hacker's perspective / Ankit Fadia.

by Fadia, Ankit, 1985-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Delhi : Macmillan India LTD., c2003Availability: No items available : Withdrawn (1).

2.
Unofficial guide to ethical hacking / Ankit Fadia.

by Fadia, Ankit, 1985-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Delhi : Macmillan, 2001Other title: Ethical hacking.Availability: No items available : Withdrawn (1).

3.
The art of deception : controlling the human element of security / Kevin D. Mitnick and William L. Simon ; foreword by Steve Wozniak.

by Mitnick, Kevin D. (Kevin David), 1963- | Simon, William L, 1930-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : Wiley, c2002Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 M58 2002 c.1 (1). Withdrawn (1).

4.
Ninja hacking : unconventional penetration testing tactics and techniques / Thomas Wilhelm, Jason Andress.

by Wilhelm, Thomas | Andress, Jason.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, MA : Syngress/Elsevier, c2011Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 W55 2011 c.1 (1).

5.
Professional penetration testing : creating and operating a formal hacking lab / Thomas Wilhelm ; technical editor, Jan Kanclirz Jr.

by Wilhelm, Thomas.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, Mass. : Syngress Pub., c2010Availability: Items available for loan: APU LibraryCall number: TK5105.59 .W55 2010 c.1 (1), APIIT LibraryCall number: CD-37-79 (2). Damaged (1).

6.
The unofficial guide to ethical hacking / Ankit Fadia.

by Fadia, Ankit, 1985-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston, MA : Primier press, c2003Other title: Ethical hacking.Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 F33 2003 c.1 (1).

7.
Network security : a hacker's perspective / Ankit Fadia.

by Fadia, Ankit, 1985-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Cincinnati, Ohio : Premier Press, c2003Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 F32 2003 c.1 (2).

8.
Gray hat hacking : the ethical hacker's handbook / Shon Harris ... [et al.].

by Harris, Shon.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : McGraw-Hill, c2008Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 G74 2008 c.1 (2).

9.
Social engineering : the art of human hacking / by Christopher Hadnagy ; [foreword by Paul Wilson].

by Hadnagy, Christopher.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, IN : Wiley, c2011Availability: Items available for loan: APU LibraryCall number: HM668 .H33 2011 c.1 (2).

10.
The ethical hacking guide to corporate security / Ankit Fadia.

by Fadia, Ankit, 1985-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi : MacMillan, c2004Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 F33 2004 c.1 (1).

11.
Computer forensics : investigating network intrusions and cybercrime / EC-Council Press.

by EC-Council Press.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Clifton Park, NY : Course Technology Cengage Learning, c2010Other title: Investigating network intrusions and cybercrime.Online access: Contributor biographical information | Publisher description Availability: Items available for loan: APU LibraryCall number: HV8079 .C66 2010 c.1 (2).

12.
Computer forensics : investigating data and image files / EC-Council Press.

by EC-Council Press.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Clifton Park, NY : Course Technology Cengage Learning, c2010Other title: Investigating data and image files..Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: APU LibraryCall number: HV8079.C65 C66 2010 c.1 (1). Lost (1).

13.
Computer forensics : investigating hard disks, file and operating systems / EC-Council Press.

by EC-Council Press.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Clifton Park, NY : Course Technology Cengage Learning, c2010Other title: Investigating hard disks, file and operating systems.Availability: Items available for loan: APU LibraryCall number: HV8079.C65 C66 2010 c.2 (1).

14.
Computer forensics : investigation procedures and response / EC-Council Press.

by EC-Council Press.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Clifton Park, NY : Course Technology Cengage Learning, c2010Other title: Investigation procedures and response.Availability: Items available for loan: APU LibraryCall number: HV8079.C65 C66 2010 c.1 (2).

15.
Computer forensics : investigating wireless networks and devices / EC-Council Press.

by EC-Council Press.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Clifton Park, NY : Course Technology Cengage Learning, c2010Other title: Investigating wireless networks and devices.Online access: Publisher description | Contributor biographical information Availability: Items available for loan: APU LibraryCall number: HV8079.C65 C66 2010 c.2 (2).

16.
The art of intrusion : the real stories behind the exploits of hackers, intruders & deceivers / Kevin D. Mitnick, William L. Simon.

by Mitnick, Kevin D. (Kevin David), 1963- | Simon, William L, 1930-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : Wiley, c2006Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 M58 2006 c.1 (1).

17.
Hacking : the art of exploitation / Jon Erickson.

by Erickson, Jon, 1977-.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: San Francisco, CA : No Starch Press, c2008Online access: Table of contents Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 E75 2008 c.1 (1), APIIT LibraryCall number: CD-37-67 (2). Lost (1).

18.
Hackers' handbook 3.0 / Dr. K.

by Dr. K, 1959-.

Edition: Expanded, rev & updated ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: London : Carlton, 2008Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 D75 2008 c.1 (1).

19.
Ethical hacking and countermeasures : module V : scanning : exam 312-50.

by EC-Council.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: [s.n.] : EC-Council, [?]Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 E84 c.1 (1).

20.
Computer hacking forensic investigator (CHFI) : module XIX : network forensics and investigation logs : exam 312-49.

by EC-Council.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: [s.n.] : EC-Council, [?]Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 C66 c.1 (1).