Skip to main content
Search using this query type:
Keyword
Boolean
Exact match
Search only these record types:
Item
File
Collection
Advanced Search (Items only)
Search
Home
Browse Items
Browse Collections
Collection Tree
GCTU Library
GCTU Home
Contact Us
Browse Items (2905 total)
Browse All
Browse by Tag
Search Items
Previous Page
of 291
Next Page
Sort by:
Title
Creator
Date Added
Real World Microsoft Access Database Protection and Security
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Web Application Security: Exploitation and Countermeasures for Modern Web Applications
The Manager’s Guide to Web Application Security A Concise Guide to the Weaker Side of the Web
Hacking web apps: detecting and preventing web application security problems
Web Application Security, A Beginner's Guide
Computer, Network, Software, and Hardware Engineering with Applications
Systems Engineering: A Systemic and Systematic Methodology for Solving Complex Problems.(2020)
Systems Engineering Models: Theory, Methods, and Applications.(2019)
Learning Pentesting for Android Devices: A practical guide to learning penetration testing for Android devices and applications
Previous Page
of 291
Next Page
Output Formats
atom
,
dcmes-xml
,
json
,
omeka-xml
,
rss2