نتایج جستجو
Compiler Design: Analysis and Transformation
Helmut Seidl, Reinhard Wilhelm, Sebastian Hack (auth.), 2012
Compiler Design: Analysis and Transformation
Helmut Seidl, Reinhard Wilhelm, Sebastian Hack (auth.), 2012
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Edward Skoudis, Tom Liston, 2006
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
Jayson E Street, Kent Nabors, Dustin L. Fritz, 2009
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit
John Chirillo, 2001
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit
John Chirillo, 2001
Hack Attacks Testing: How to Conduct Your Own Security Audit
John Chirillo, 2002
Hack I.T.: security through penetration testing
T. J. Klevinsky, Scott Laliberte, Ajay Gupta, 2002
Hack I.T.: Security Through Penetration Testing
T. J. Klevinsky, Scott Laliberte, Ajay Gupta, 2002
Hack I.T.: Security Through Penetration Testing
T. J. Klevinsky, Scott Laliberte, Ajay Gupta, 2002
Hack Proofing ColdFusion
Casco S., Rusher R., Meyer G., 2002
Hack Proofing ColdFusion
Steve Casco, 2002
Hack proofing linux
James Stanger, Patrick T. Lane, 2001
Hack Proofing Linux : A Guide to Open Source Security
James Stanger, Patrick T. Lane, 2001
Hack Proofing Linux : A Guide to Open Source Security
James Stanger, Patrick T. Lane, 2001

مقالات ISI مرتبط

