نتایج جستجو
CEH: Official Certified Ethical Hacker Review Guide
Kimberly Graves, 2007
CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
Kimberly Graves, 2007
Certified Ethical Hacker Exam Prep
Michael Gregg, 2006
Cyber Adversary Characterization: Auditing the Hacker Mind
Parker T., Sachs M., Shaw E., 2004
Cyber Adversary Characterization: Auditing the Hacker Mind
Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz, Matthew G. Devost, 2004
Defeating the Hacker: A Non-Technical Guide to Computer Security
Robert Schifreen, 2006
Die Hacker-Bibel
Ryan Russell, 2002
Firewalls and Internet Security: Repelling the Wily Hacker
William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin, 2003
Firewalls and Internet Security: Repelling the Wily Hacker
William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin, 2003
Google A Hacker's Best Friend
McClure, Stuart.
Gray Hat Hacking - The Ethical Hacker's Handbook
Shon Harris, Allen Harper, Chris Eagle, and Jonathan Ness, 2008
Gray Hat Hacking The Ethical Hacker's Handbook
Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims, 2015
Hack proofing your Web applications: the only way to stop a hacker is to think like one
L. Brent Huston, Teri Bidwell, Ryan Russell, Robin Walshaw, Oliver Steudler, 2001
Hacker Attack
Richard Mansfield, 2006
Hacker Crackdown, the
Bruce Sterling, 1993
Hacker culture
Douglas Thomas, 2002
Hacker Disassembling Uncovered
Kris Kaspersky, 2003
Hacker disassembling uncovered
Kris Kaspersky, 2003
Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming
Kris Kaspersky, 2003
Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming
Kris Kaspersky, 2003
Hacker Journal - Numeri dal 01 al 32
Luca Sprea, 2002
Hacker Linux Uncovered
Michael Flenov, 2005
