Resultados da busca
-
1
Technology and privacy : the new landscape /
Publicado em 1997Obter o texto integral
Licensed eBooks -
2
-
3
-
4
Nokia network security : solutions handbook /
Publicado em 2002Obter o texto integral
Licensed eBooks -
5
Hack proofing your Web applications : the only way to stop a hacker is to think like one.
Publicado em 2001Obter o texto integral
Licensed eBooks -
6
-
7
Information security best practices : 200 basic rules /
Publicado em 2001Obter o texto integral
Licensed eBooks -
8
Stealing the network : how to own the box /
Publicado em 2003Obter o texto integral
Licensed eBooks -
9
Techniques and applications of digital watermarking and content protection /
Publicado em 2003Obter o texto integral
Licensed eBooks -
10
Who goes there? : authentication through the lens of privacy /
Publicado em 2003Obter o texto integral
Licensed eBooks -
11
Protecting your library's digital sources : the essential guide to planning and preservation /
Publicado em 2004Obter o texto integral
Licensed eBooks -
12
-
13
Buffer overflow attacks : detect, exploit, prevent /
Publicado em 2005Obter o texto integral
Licensed eBooks -
14
Security and control in information systems : a guide for business and accounting /
Publicado em 2000Obter o texto integral
Licensed eBooks -
15
-
16
Basics of contemporary cryptography for IT practitioners /
Publicado em 2005Obter o texto integral
Licensed eBooks -
17
Essential computer security : everyone's guide to e-mail, internet, and wireless security /
Publicado em 2006Obter o texto integral
Licensed eBooks -
18
-
19
Risk management for computer security : Protecting your network and information assets /
Publicado em 2005Obter o texto integral
Licensed eBooks -
20
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network /
Publicado em 2006Obter o texto integral
Licensed eBooks