Showing 1 - 10 results of 10 for search 'Oriyano, Sean-Philip', query time: 0.05s
Refine Results
-
1
Cryptography : Infosec pro guide / by Oriyano, Sean-Philip
Published 2013Call Number: Loading…CONNECT
Located: Loading…
Electronic eBook -
2
Penetration testing essentials. by Oriyano, Sean-Philip
Published 2017Call Number: Loading…CONNECT
Located: Loading…
Electronic eBook -
3
CEH v9 : Certified ethical hacker version 9, study guide / by Oriyano, Sean-Philip
Published 2016Call Number: Loading…CONNECT
Located: Loading…
Electronic eBook -
4
Penetration testing essentials / by Oriyano, Sean-Philip
Published 2017Call Number: Loading…CONNECT
Located: Loading…
Electronic eBook -
5
Client-side attacks and defense / by Oriyano, Sean-Philip
Published 2012Call Number: Loading…CONNECT
Located: Loading…
Electronic eBook -
6
Kali Linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wirele... by Oriyano, Sean-Philip
Published 2017Call Number: Loading…CONNECT
Located: Loading…
CONNECT
Electronic eBook -
7
Hands-on penetration testing with Kali NetHunter : spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go / by Singh, Glen D., Oriyano, Sean-Philip
Published 2019Call Number: Loading…CONNECT
Located: Loading…
Electronic eBook -
8
CISSP Training Kit. by Miller, David R., Pearson, Brock, Oriyano, Sean-Philip
Published 2014Call Number: Loading…CONNECT
Located: Loading…
Electronic eBook -
9
Client-side attacks and defense / by Shimonski, Robert
Published 2012Other Authors: “…Oriyano, Sean-Philip…”
Call Number: Loading…CONNECT
Located: Loading…
Electronic eBook -
10
Hands-On Penetration Testing with Kali NetHunter : Spy on and Protect Vulnerable Ecosystems Using the Power of Kali Linux for Pentesting on the Go. by Singh, Glen D.
Published 2019Other Authors: “…Oriyano, Sean-Philip…”
Call Number: Loading…CONNECT
Located: Loading…
Electronic eBook
Search Tools:
Related Subjects
Computer networks
Penetration testing (Computer security)
Security measures
Access control
Computer security
Hackers
Certification
Electronic data processing personnel
Examinations
Application software
Computer crimes
Computers
Cryptography
Data encryption (Computer science)
Hacking
Prevention
Testing
Wireless Internet