Your search returned 21 results.

|
1.
Advanced Penetration Testing : Hacking the World's Most Secure Networks.

by Allsopp, Wil.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : John Wiley & Sons, Incorporated, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.A457 2017.
2.
CISO's Guide to Penetration Testing : A Framework to Plan, Manage, and Maximize Benefits.

by Tiller, James S.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2016Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- T56 2012.
3.
Penetration Testing Essentials.

by Oriyano, Sean-Philip | Shimonski.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis : John Wiley & Sons, Incorporated, 2016Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .O759 2017.
4.
Penetration Tester's Open Source Toolkit.

by Faircloth, Jeremy.

Edition: 4th ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Rockland, MA : Elsevier Science, 2015Copyright date: ©2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59.F357 2017.
5.
Hacking with Kali : practical penetration testing techniques / James Broad, Andrew Bindner.

by Broad, James | Bindner, Andrew.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Waltham, MA : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .B384 2013.
6.
Conducting Network Penetration and Espionage in a Global Environment.

by Middleton, Bruce.

Material type: Text Text; Format: electronic available online remote Publisher: Philadelphia, PA : CRC Press, 2014Online access: Click here to view this ebook. Availability: No items available :
7.
Social Engineering Penetration Testing : Executing Social Engineering Pen Tests, Assessments and Defense

by Watson, Gavin | Mason, Andrew | Ackroyd, Richard.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .W38 2014.
8.
Ethical Hacking and Penetration Testing Guide.

by Baloch, Rafay.

Material type: Text Text; Format: electronic available online remote Publisher: Philadelphia, PA : CRC Press, 2014Online access: Click here to view this ebook. Availability: No items available :
9.
Hacking and Penetration Testing with Low Power Devices.

by Polstra, Philip.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25 P5965 2015.
10.
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research.

by Maynor, David | Mookhey, K. K.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 M396 2007.
11.
Penetration testing services procurement guide. Version 1.

by Creasey, Jason | Crest.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridgeshire, UK : [Place of publication not identified] : IT Governance Pub. ; Crest, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .C743 2014.
12.
Procuring penetration testing services.

by Crest.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridge, UK : IT Governance Pub., 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .P763 2014.
13.
Computer and information security handbook / edited by John R. Vacca.

by Vacca, John R.

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Amsterdam : Morgan Kaufmann Publishers is an imprint of Elsevier, [2013]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 C627 2013eb.
14.
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / Patrick Engebretson.

by Engebretson, Pat (Patrick Henry), 1974-.

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Amsterdam : Syngress, an imprint of Elsevier, 2013Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 E5443 2013eb.
15.
Software Test Attacks to Break Mobile and Embedded Devices.

by Hagar, Jon Duncan.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 H343 2013.
16.
The basics of web hacking : tools and techniques to attack the Web / Josh Pauli.

by Pauli, Joshua J.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .P385 2013eb.
17.
Professional penetration testing : creating and learning in a hacking lab / Thomas Wilhelm ; Matthew Neely, technical editor.

by Wilhelm, Thomas | Neely, Matthew.

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Amsterdam : Syngress, an imprint of Elsevier, 2013Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .W544 2013eb.
18.
Cyber Security : Deterrence and IT Protection for Critical Infrastructures

by Martellini, Maurizio.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25.
19.
Hacking with Kali : Practical Penetration Testing Techniques

by Broad, James | Bindner, Andrew.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .B384 2013.
20.
CISO's Guide to Penetration Testing : A Framework to Plan, Manage, and Maximize Benefits

by Tiller, James S.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 T56 2012.