Skip to main content
Search using this query type:
Keyword
Boolean
Exact match
Search only these record types:
Item
File
Collection
Advanced Search (Items only)
Search
Home
Browse Items
Browse Collections
Collection Tree
GCTU Library
GCTU Home
Contact Us
Browse Items (1587 total)
Browse All
Search Items
Previous Page
of 159
Next Page
Sort by:
Title
Creator
Date Added
Hacking web apps: detecting and preventing web application security problems
The Manager’s Guide to Web Application Security A Concise Guide to the Weaker Side of the Web
Web Application Security: Exploitation and Countermeasures for Modern Web Applications
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Real World Microsoft Access Database Protection and Security
Oracle Database 12c Security
From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday
Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects
Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite
Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment
Previous Page
of 159
Next Page
Output Formats
atom
,
dcmes-xml
,
json
,
omeka-xml
,
rss2