نتایج جستجو
Insider Attack and Cyber Security. Beyond the Hacker
Salvatore Stolfo, 2008
Introduction to computer security
Matt Bishop, 2004
LAN Switch Security: What Hackers Know About Your Switches
Eric Vyncke, 2007
Metasploit Toolkit [computer security
David Maynor, 2007
Mission Critical Security Planner
Eric Greenberg, 2003
Mission-Critical Security Planner When Hackers Won’t Take No for an Answer
Eric Greenberg, 2003
Mission-Critical Security Planner: When Hackers Won't Take No For an Amswer
Eric Greenberg, 2003
Mission-Critical Security Planner: When Hackers Won't Take No for an Answer
Eric Greenberg, 2003
Network Security Hacks
Andrew Lockhart, 2004
Network Security Hacks
Andrew Lockhart, 2004
Network Security Hacks: Tips & Tools for Protecting Your Privacy
Andrew Lockhart, 2006
Outsourcing Information Security
C. Warren Axelrod, 2004
Penetration Testing with Kali Linux v1.0.1
Offensive Security, 2014
Security Concepts
Theodore Parker, 2009
Security on Rails
Ben Poweski, 2009
Security on Rails
Ben Poweski, 2009
SSL and TLS: Theory and Practice (Information Security and Privacy)
Rolf Oppliger, 2009
Agroforestry Systems in India: Livelihood Security & Ecosystem Services
Jagdish Chander Dagar, 2014
India in a Reconnecting Eurasia: Foreign Economic and Security Interests
Gulshan Sachdeva, 2016
