10 results
Skip to content
Toggle navigation
VuFind
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
0
items
(Full)
Your Account
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
Author
Andress, Jason.
Showing
1
-
10
of
10
for search:
'Andress, Jason.'
, query time: 0.09s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
1
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
Second edition.
by
Andress
,
Jason
,
Published: Syngress, 2014
Description: 1 online resource.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
2
Coding for penetration testers : building better tools
Second edition.
by
Andress
,
Jason
,
Published: Syngress, 2016
Description: 1 online resource : illustrations (black and white)
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
3
Cyber Warfare : Techniques, Tactics and Tools for Security Practitioners
Second edition.
by
Andress
,
Jason
,
Published: Syngress, an imprint of Elsevier, 2014
Description: 1 online resource (325 pages)
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
4
Coding for penetration testers : building better tools
by
Andress
,
Jason
.
Published: Syngress, 2011
Description: 1 online resource (xxiv, 295 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
5
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
by
Andress
,
Jason
.
Published: Syngress, 2011
Description: 1 online resource (xviii, 171 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
6
Cyber warfare : techniques, tactics and tools for security practitioners
by
Andress
,
Jason
.
Published: Elsevier/Syngress, 2011
Description: 1 online resource (xxvii, 289 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
7
Building a practical information security program
by
Andress
,
Jason
,
Published: Syngress, 2017
Description: 1 online resource.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
8
Ninja hacking : unconventional penetration testing tactics and techniques
by
Wilhelm, Thomas.
Published: Syngress/Elsevier, 2011
Description: 1 online resource (xxii, 310 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
9
The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice
by
Winterfeld, Steve.
Published: Syngress, 2012
Description: 1 online resource.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
10
Protecting patient information : a decision-maker's guide to risk, prevention, and damage control
by
Cerrato, Paul,
Published: Syngress is an imprint of Elsevier, 2016
Description: 1 online resource.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
Select Page | with selected:
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Related Subjects
Computer networks Security measures
Computer security
Information warfare
Computer networks Security measures Testing
Computer science
Information resources management
Information technology Security measures
Penetration testing (Computer security)
Business enterprises Computer networks Security measures
Confidential communications Physicians
Data protection
Information storage and retrieval systems Security measures
Internet Security measures
Medical records Access control
×
Loading...