Ngā hua rapu
-
1
Technology and privacy : the new landscape /
I whakaputaina 1997Whiwhi kuputuhi katoa
Licensed eBooks -
2
-
3
-
4
Nokia network security : solutions handbook /
I whakaputaina 2002Whiwhi kuputuhi katoa
Licensed eBooks -
5
Hack proofing your Web applications : the only way to stop a hacker is to think like one.
I whakaputaina 2001Whiwhi kuputuhi katoa
Licensed eBooks -
6
-
7
Information security best practices : 200 basic rules /
I whakaputaina 2001Whiwhi kuputuhi katoa
Licensed eBooks -
8
Stealing the network : how to own the box /
I whakaputaina 2003Whiwhi kuputuhi katoa
Licensed eBooks -
9
Techniques and applications of digital watermarking and content protection /
I whakaputaina 2003Whiwhi kuputuhi katoa
Licensed eBooks -
10
Who goes there? : authentication through the lens of privacy /
I whakaputaina 2003Whiwhi kuputuhi katoa
Licensed eBooks -
11
Protecting your library's digital sources : the essential guide to planning and preservation /
I whakaputaina 2004Whiwhi kuputuhi katoa
Licensed eBooks -
12
-
13
Buffer overflow attacks : detect, exploit, prevent /
I whakaputaina 2005Whiwhi kuputuhi katoa
Licensed eBooks -
14
Security and control in information systems : a guide for business and accounting /
I whakaputaina 2000Whiwhi kuputuhi katoa
Licensed eBooks -
15
Penetration tester's open source toolkit /
I whakaputaina 2006Whiwhi kuputuhi katoa
Licensed eBooks -
16
Basics of contemporary cryptography for IT practitioners /
I whakaputaina 2005Whiwhi kuputuhi katoa
Licensed eBooks -
17
Essential computer security : everyone's guide to e-mail, internet, and wireless security /
I whakaputaina 2006Whiwhi kuputuhi katoa
Licensed eBooks -
18
-
19
Risk management for computer security : Protecting your network and information assets /
I whakaputaina 2005Whiwhi kuputuhi katoa
Licensed eBooks -
20
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network /
I whakaputaina 2006Whiwhi kuputuhi katoa
Licensed eBooks