Rezultaty
-
1
-
2
-
3
-
4
-
5
Hack proofing your Web applications : the only way to stop a hacker is to think like one.
Wydane 2001Dokumenty pełnotekstowe
Licensed eBooks -
6
-
7
Information security best practices : 200 basic rules /
Wydane 2001Dokumenty pełnotekstowe
Licensed eBooks -
8
-
9
Techniques and applications of digital watermarking and content protection /
Wydane 2003Dokumenty pełnotekstowe
Licensed eBooks -
10
Who goes there? : authentication through the lens of privacy /
Wydane 2003Dokumenty pełnotekstowe
Licensed eBooks -
11
-
12
-
13
Buffer overflow attacks : detect, exploit, prevent /
Wydane 2005Dokumenty pełnotekstowe
Licensed eBooks -
14
Security and control in information systems : a guide for business and accounting /
Wydane 2000Dokumenty pełnotekstowe
Licensed eBooks -
15
-
16
Basics of contemporary cryptography for IT practitioners /
Wydane 2005Dokumenty pełnotekstowe
Licensed eBooks -
17
Essential computer security : everyone's guide to e-mail, internet, and wireless security /
Wydane 2006Dokumenty pełnotekstowe
Licensed eBooks -
18
-
19
Risk management for computer security : Protecting your network and information assets /
Wydane 2005Dokumenty pełnotekstowe
Licensed eBooks -
20
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network /
Wydane 2006Dokumenty pełnotekstowe
Licensed eBooks