Asia Pacific University Library catalogue


Your search returned 39 results.

|
21.
Ethical hacking and countermeasures : module XVIII : web-based password cracking techniques : exam 312-50.

by EC-Council.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: [s.n.] : EC-Council, [?]Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 E84 c.1 (1).

22.
Ethical hacking and countermeasures : module V : scanning : exam 312-50.

by EC-Council.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: [s.n.] : EC-Council, [?]Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 E84 c.1 (1).

23.
Ethical hacking and countermeasures : introduction to ethical hacking : exam 312-50 certified ethical hacker : CEHv6 courseware.

by EC-Council.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: [s.n.] : EC-Council, [?]Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 E84 c.1 (1).

24.
Ethical hacking and countermeasures : CEHv6 : lab manual.

by EC-Council.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: [s.n.] : EC-Council, [?]Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 E84 c.1 (1).

25.
Penetration testing : a hands-on introduction to hacking / Georgia Weidman.

by Weidman, Georgia.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: San Francisco : No Starch Press, c2014Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 W45 2014 c.1 (1). Lost (1).

26.
Hacking for dummies / by Kevin Beaver.

by Beaver, Kevin.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Hoboken, NJ : Chichester : Wiley ; John Wiley [distributor], c2007Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 B42 2007 c.1 (1).

27.
Certified ethical hacker / Michael Gregg.

by Gregg, Michael (Michael C.).

Series: Exam prepMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: [Indianapolis, Ind.] : Que Certification, c2006Availability: Items available for loan: APU LibraryCall number: QA76.3 .G74 2006 c.1 (1), APIIT LibraryCall number: CD-40-93 (1).

28.
Gray hat hacking : the ethical hacker's handbook / Daniel Regalado...[et al.].

by Regalado, Daniel.

Edition: 4th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : McGraw-Hill Education, c2015Availability: No items available : Lost (1).

29.
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / Dr. Patrick Engebretson, David Kennedy, Technical Editor.

by Engebretson, Pat (Patrick Henry), 1974-.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Waltham, USA ; Syngress, c2013Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 E54 2013 c.1 (3).

30.
Hacker techniques, tools, and incident handling / Sean-Philip Oriyano.

by Oriyano, Sean-Philip.

Series: Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlinton, MA : Jones & Bartlett Learning, c2014Availability: Items available for loan: APU LibraryCall number: TK5105.59 .O75 2014 c.1 (2).

31.
Network forensics : tracking hackers through cyberspace / Sherri Davidoff, Jonathan Ham.

by Davidoff, Sherri | Ham, Jonathan.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Prentice Hall, c2012Availability: Items available for loan: APU LibraryCall number: HV8079.C65 D38 2012 c.1 (1).

32.
Advanced penetration testing : hacking the world's most secure networks / Wil Allsopp ; foreword Hans van de Looy.

by Allsopp, Wil.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, IN : John Wiley & Sons, Inc., [2017] ©2017Availability: No items available : Lost (1).

33.
Penetration testing essentials / Sean-Philip Oriyano.

by Oriyano, Sean-Philip.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Indiana : Sybex, a Wiley brand, [2017]Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 O75 2017 c.1 (1).

34.
CompTIA PenTest+ study guide : exam PT0-002 / Mike Chapple, David Seidl.

by Chapple, Mike | Seidl, David, CISSP [author.].

Edition: Second edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: [S.l.] : WILEY-SYBEX, 2021Availability: Items available for loan: APU LibraryCall number: QA76.9 .A25 C43 2021 c.1 (1).

35.
The hacker playbook 3 : practical guide to penetration testing / Peter Kim

by Kim, Peter.

Edition: Red team editionMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: [North Charleston, South Carolina] : Secure Planet LLC, c2018Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 K56 2018 c.1 (1).

36.
CEH certified ethical hacker all-in-one exam guide / Matt Walker.

by Walker, Matthew [author.].

Edition: Fifth edition.Material type: Text Text; Format: print ; Literary form: Not fiction Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 W345 2022 c.1 (1).

37.
Battle of hackers : Web exploitation handbook / Nor Azlina Abd Rahman & Roheendeer Singh Sahota

by Nor Azlina Abd Rahman.

Edition: First edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Coppel , TX : Independently published, 2024Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 N67 2024 c.1 (3).

38.
Learn computer forensics: your one-stop guide to searching, analyzing, acquiring, and securing digital evidence / William Oettinger.

by Oetttinger, William [author. ].

Material type: Text Text; Format: electronic regular print ; Literary form: Not fiction Publication details: Birmingham : Packt Publishing Limited, ©2022Availability: Items available for loan: APU LibraryCall number: HV8079.C65 .O38 2022 c.1 (1).

39.
The ultimate Kali Linux book perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire / Glen D. Singh.

by Singh, Glen D [author.].

Edition: Second edition.Material type: Text Text; Format: print regular print ; Literary form: Not fiction Publisher: Birmingham : Packt Publishing, ©2022Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 .G54 2022 c.1 (1).