Search again

Found: 9  Titles

Order by :    Show:   Per Page
image
Authentiction network access control by using IPv4 = การตรวจสอบการลงทะเบียนเพื่อเข้าใช้งานโครงข่าย IPv4 / Parinya Thamthawornsakul.
Author
Parinya Thamthawornsakul.
Published
2018.
Call Number
EThesis
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics / Yuri Diogenes, Erdal Ozkaya.
Author
Diogenes, Yuri.
Published
Birmingham, United Kingdom : Packt Publishing, 2018.
Call Number
Ebook

image
Hands-on cybersecurity for architects plan and design robust security architectures / Neil Rerup, Milad Aslaner.
Author
Rerup, Neil.
Published
Birmingham, United Kingdom : Packt Publishing, 2018.
Call Number
Ebook

image
Hands-on cybersecurity with Blockchain implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain / Rajneesh Gupta.
Author
Gupta, Rajneesh.
Published
Birmingham, United Kingdom : Packt Publishing, c2018.
Call Number
Ebook

image

image
Learn ethical hacking from scratch your stepping stone to penetration testing / Zaid Sabih.
Author
Sabih, Zaid.
Published
Birmingham, UK : Packt Publishing, c2018.
Call Number
Ebook

image

image
Practical network scanning capture network vulnerabilities using standard tools such as Nmap and Nessus / Ajay Singh Chauhan.
Author
Chauhan, Ajay Singh.
Published
Birmingham, UK : Packt Publishing, c2018.
Call Number
Ebook

image
Robust image encryption method with cipher stream chaining process / Sovan Tep.
Author
Sovan Tep.
Published
2018.
Call Number
EThesis
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles