East Baton Rouge Parish Library
Computer security + Computer programs
Type
http://bibfra.me/vocab/lite/Concept
Label
Computer security + Computer programs
Name
Computer security + Computer programs
Focus
Computer security + Computer programs
Sub focus
Computer programs
Computer security
Actions
Share resources
Incoming Resources
Subject of
6
The Ghidra book, the definitive guide, by Chris Eagle and Kara Nance
Evading EDR, sensors, telemetry, and how to bypass them, by Matt Hand
Reverse engineering code with IDA Pro, Justin Ferguson ... [et al. ; Dan Kaminsky, technical editor and contributing author]
Key management deployment guide, using the IBM Enterprise key management foundation, Mike Andreasen [and others]
Essential Check Point FireWall-1 NG, an installation, configuration, and troubleshooting guide, Dameon D. Welch-Abernathy
Check Point Firewall Administration R81. 10+, a Practical Guide to Check Point Firewall Deployment and Administration, Vladimir Yakovlev ; foreword by Dameon D. Welch
Outgoing Resources
Focus
1
Computer security + Computer programs
Sub focus
2
Computer programs
Computer security
Link Analysis