Showing
1 - 18
results of
18
for search '
'
Skip to content
Catalog K.UTB
Čeština
Login
TBU Catalog
e-resources
E-THESES
All Fields
Title
Author
Subject
ISBN/ISSN
Find
Advanced Search
Page will reload when a filter is removed.
Reset Filters
Applied Filters:
Topics:
Remove Filter
penetration tests (computer security)
Page will reload when a filter is removed.
Reset Filters
Show filters (1)
Topics:
Remove Filter
penetration tests (computer security)
Search Results
Showing
1 - 18
results of
18
for search '
'
, query time: 0.04s
Refine Results
Results per page
10
20
40
60
80
100
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Loading…
Hands-on appplication penetration testing with burp suite : use burp suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
by
Lozano, Carlos A.
,
Shah, Dhruv
,
Walikar, Riyaz Ahemed
Year of Publication
2019
Call Number
Loading…
Book
Loading…
Save to List
Saved in:
2
Loading…
Corporate cybersecurity : identifying risks and the bug bounty program
by
Jackson, John (Cybersecurity professional)
Year of Publication
2022
Call Number
Loading…
Plný text
Electronic
eBook
Save to List
Saved in:
3
Loading…
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually
by
Cardwell, Kevin
Year of Publication
2014
Call Number
Loading…
Book
Loading…
Save to List
Saved in:
4
Loading…
Learning iOS penetration testing : secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests
by
Yermalkar, Swaroop
Year of Publication
2016
Call Number
Loading…
Book
Loading…
Save to List
Saved in:
5
Loading…
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications
by
Gupta, Aditya
Year of Publication
2014
Call Number
Loading…
Book
Loading…
Save to List
Saved in:
6
Loading…
Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach
by
Jaswal, Nipun
Year of Publication
2014
Call Number
Loading…
Book
Loading…
Save to List
Saved in:
7
Loading…
Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linux
by
Sak, Brian
,
Raghu Ram, Jilumundi
Year of Publication
2016
Call Number
Loading…
Book
Loading…
Save to List
Saved in:
8
Loading…
Mobile application penetration testing : explore real-world threat scenarios, attacks on mobile applications, and ways to counter them
by
Velu, Vijay Kumar
Year of Publication
2016
Call Number
Loading…
Book
Loading…
Save to List
Saved in:
9
Loading…
Advanced penetration testing for highly-secured environments : employ the most advanced pentesting techniques and tools to build highly-secured systems and environments
by
Allen, Lee
,
Cardwell, Kevin
Year of Publication
2016
Call Number
Loading…
Book
Loading…
Save to List
Saved in:
10
Loading…
Learning zANTI2 for Android pentesting : dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2
by
Vitula, Miroslav
Year of Publication
2015
Call Number
Loading…
Book
Loading…
Save to List
Saved in:
11
Loading…
Building a pentesting lab for wireless networks : build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques
by
Fadyushin, Vyacheslav
,
Popov, Andrey
Year of Publication
2016
Call Number
Loading…
Book
Loading…
Save to List
Saved in:
12
Loading…
Hacking : praktický průvodce penetračním testováním
by
Kim, Peter
Year of Publication
2015
Call Number
Loading…
Book
Loading…
Save to List
Saved in:
13
Loading…
Mobile device exploitation cookbok : over 40 recipes to master mobile device penetration testing with open source tools
by
Verma, Prashant
,
Dixit, Akshay
Year of Publication
2016
Call Number
Loading…
Book
Loading…
Save to List
Saved in:
14
Loading…
The hacker playbook 2 : practical guide to penetration testing
by
Kim, Peter
Year of Publication
2015
Call Number
Loading…
Book
Loading…
Save to List
Saved in:
15
Loading…
Cloud computing solutions and security of EU remote interactive laboratories network = Cloud Computingové riešenia a bezpečnosť siete vzdialených interaktívnych laboratórií EU : di...
by
Beňo, Pavel, 1977-
Year of Publication
2019
Call Number
Loading…
Online verze
Book
Save to List
Saved in:
16
Loading…
Cloud computing solutions and security of EU remote interactive laboratories network = Cloud Computingové riešenia a bezpečnosť siete vzdialených interaktívnych laboratórií EU : te...
by
Beňo, Pavel, 1977-
Year of Publication
2019
Call Number
Loading…
Plný text dostupný bez omezení
Electronic
eBook
Save to List
Saved in:
17
Loading…
CEH v9 : Certified ethical hacker version 9, study guide
by
Oriyano, Sean-Philip
Year of Publication
2016
Call Number
Loading…
Plný text
Electronic
eBook
Save to List
Saved in:
18
Loading…
Penetration testing essentials.
by
Oriyano, Sean-Philip
Year of Publication
2017
Call Number
Loading…
Plný text
Electronic
eBook
Save to List
Saved in:
RSS Feed
Email Search
Save Search
Search History
Back
Refine Results
Page will reload when a filter is selected or excluded.
Library
Knihovna UTB
14 results
14
Format
Book
14 results
14
Electronic
4 results
4
eBook
4 results
4
Topics
penetration tests (computer security)
penetrační testy (počítačová bezpečnost)
18 results
18
computer security
12 results
12
počítačová bezpečnost
12 results
12
mobile operating systems
4 results
4
mobilní operační systémy
4 results
4
See more
Author
Beňo, Pavel, 1977-
2 results
2
Cardwell, Kevin
2 results
2
Kim, Peter
2 results
2
Oriyano, Sean-Philip
2 results
2
Schauer, František
2 results
2
Allen, Lee
1 results
1
See more
Language
English
17 results
17
Czech
3 results
3
Genre
příručky
13 results
13
handbooks, manuals, etc
9 results
9
handbooks and manuals
4 results
4
electronic books
3 results
3
elektronické knihy
3 results
3
abstracts
1 results
1
See more
Year of Publication
From:
To: