Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: Performance
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"005 - Computer programming, programs & data"
dewey-ones:"364 - Criminology"
language:"English"
Showing
1
-
16
of
16
Search:
'Performance'
,
query time: 0.05s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Penetration testing essentials
by
Oriyano, Sean-Philip
Published 2017
Sybex
Table of Contents:
“
... of Test to
Perform
-- Gaining Permission via a Contract -- Following the Law While Testing -- ch. 5...
”
Call Number:
QA76.9.A25
Read Now
2
The cyber risk handbook : creating and measuring effective cybersecurity capabilities
by
Antonucci, Domenic
Published 2017
John Wiley and Sons, Inc.
Table of Contents:
“
... -- Cybersecurity policies and procedures -- Cyber strategic
performance
management -- Standards and frameworks...
”
Call Number:
HD30.38
Read Now
3
Emerging trends in ICT security
Published 2013
Morgan Kaufmann/Elsevier
“
... aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for
performance
...
”
Call Number:
QA76.9.A25
Read Now
4
Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics
by
Diogenes, Yuri
,
Ozkaya, Erdal
Published 2018
Packt Publishing
Table of Contents:
“
... -- Forming a disaster recovery team --
Performing
risk assessment -- Prioritizing processes and operations...
”
Call Number:
QA76.9.A25
Read Now
5
Incident response & computer forensics
by
Luttgens, Jason T.
Published 2014
McGraw-Hill Education
Table of Contents:
“
...Questions -- Part III: Data Collection -- Chapter 7: Live Data Collection -- When to
Perform
a Live...
”
Call Number:
QA76.9.A25
Read Now
6
Practical Windows forensics : leverage the power of digital forensics for Windows systems
by
Shaaban, Ayman
,
Sapronov, Konstantin
Published 2016
Packt Publishing
“
... of
performing
forensics on Windows-based systems using digital artifacts.It uses specific open source and Linux...
”
Call Number:
HV8079.C65
Read Now
7
Mobile malware attacks and defense
by
Dunham, Ken
Published 2009
Syngress Pub.
“
..., current, and future risks, protect your banking, auctioning, and other activities
performed
on mobile...
”
Call Number:
TK5102.85
Read Now
8
Ninja hacking : unconventional penetration testing tactics and techniques
by
Wilhelm, Thomas
Published 2011
Syngress/Elsevier
“
... the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt
perform
...
”
Call Number:
QA76.9.A25
Read Now
9
Windows forensics cookbook : 61 recipes to help you analyze Windows systems
by
Sulkin, Oleg
,
Courcier, Scar de
Published 2017
Packt Publishing
“
... to troubleshoot issues that arise while
performing
digital forensic investigations. By the end of the book, you...
”
Call Number:
HV8079.C65
Read Now
10
The Basics of Hacking and Penetration Testing : Ethical Hacking and Penetration Testing Made Easy
by
Engebretson, Patrick
Published 2013
Syngress
“
... to complete a penetration test or
perform
an ethical hack. You learn how to properly utilize and interpret...
”
Call Number:
QA76.9
Read Now
11
Cybersecurity Ops with bash : attack, defend, and analyze from the command line
by
Troncone, Paul
,
Albing, Carl
Published 2019
O'Reilly Media
“
.... This practical guide shows you how to use the CLI with the bash shell to
perform
tasks such as data collection...
”
Call Number:
QA76.9.A25
Read Now
12
Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by
Datt, Samir
Published 2016
Packt Publishing
“
... traffic acquisition software and know how to manage and handle the evidence
Perform
packet analysis...
”
Call Number:
TK5105.59
Read Now
13
Windows Forensics : Understand Analysis Techniques for Your Windows
by
Easttom, Chuck
,
Butler, William
,
Phelan, Jessica
,
Bhagavatula, Ramya Sai
Published 2024
Apress
“
... or
performing
a forensic investigation of systems that run on Windows operating systems. It also includes...
”
Call Number:
QA76.76.M52
Read Now
14
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory
by
Ligh, Michael Hale
,
Case, Andrew
,
Levy, Jamie
,
Walters, Aaron
Published 2014
John Wiley and Sons
“
... to the investigative process. This book provides a comprehensive guide to
performing
memory forensics for Windows...
”
Call Number:
TK5105.59
Read Now
15
Hands-on network forensics : investigate network attacks and find evidence using common network forensic tools
by
Jaswal, Nipun
Published 2019
Packt Publishing
“
... will have gained hands-on experience of
performing
forensics analysis tasks. What you will learn Discover...
”
Call Number:
TK5105.59
Read Now
16
Ransomware revealed : a beginner's guide to protecting and recovering from ransomware attacks
by
Hassan, Nihad A.
Published 2019
Apress
Call Number:
QA76.76.C68
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 005 - Computer programming, programs & data
Clear Filter
Classification: 364 - Criminology
Clear Filter
Language: English
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
364 - Criminology
331 - Labor economics
12
330 - Economics
3
338 - Production
3
001 - Knowledge
1
more ...
368 - Insurance
1
384 - Communications; telecommunication
1
500 - Natural sciences & mathematics
1
658 - General management
1
see all ...
less ...
Language
English
Collection
O'Reilly
16
Author
Abu-Nimeh, Saeed
1
Akhgar, Babak
1
Albing, Carl
1
Andress, Jason
1
Antonucci, Domenic
1
Arabnia, Hamid
1
more ...
Bhagavatula, Ramya Sai
1
Butler, William
1
Case, Andrew
1
Courcier, Scar de
1
Datt, Samir
1
Diogenes, Yuri
1
Dunham, Ken
1
Easttom, Chuck
1
Engebretson, Patrick
1
Hassan, Nihad A.
1
Jaswal, Nipun
1
Levy, Jamie
1
Ligh, Michael Hale
1
Luttgens, Jason T.
1
Oriyano, Sean-Philip
1
Ozkaya, Erdal
1
Pepe, Matthew
1
Phelan, Jessica
1
Sapronov, Konstantin
1
Shaaban, Ayman
1
Sulkin, Oleg
1
Troncone, Paul
1
Walters, Aaron
1
Wilhelm, Thomas
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22005+-+Computer+programming%2C+programs+%26+data%22&filter%5B%5D=dewey-ones%3A%22364+-+Criminology%22&filter%5B%5D=language%3A%22English%22&lookfor=Performance&type=AllFields
Send by Email
×
Loading...