Search Results - Chasing Amy~

  1. 161
  2. 162
  3. 163
  4. 164
  5. 165
  6. 166
  7. 167
  8. 168
  9. 169
  10. 170
  11. 171
  12. 172
  13. 173
  14. 174
  15. 175
  16. 176
  17. 177
  18. 178
  19. 179

    PURANAKILA by Saadiah Ibrahim

    Published 2015
    Click Here to View Status and Holdings.
    Manuscript Book
  20. 180

    Cybersecurity - Attack and Defense Strategies by Diogenes, Yuri, Ozkaya, Erdal

    Published 2019
    Table of Contents: “…Table of ContentsSecurity PostureIncident Response ProcessWhat is a Cyber Strategy?Understanding the Cybersecurity Kill ChainReconnaissanceCompromising the SystemChasing a User's IdentityLateral MovementPrivilege EscalationSecurity PolicyNetwork SegmentationActive SensorsThreat IntelligenceInvestigating an IncidentRecovery ProcessVulnerability ManagementLog Analysis…”
    Click Here to View Status and Holdings.
    Book