نتایج جستجو
Offensive Security OSCP
Offensive Security, 2020
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges
Qing Li; Gregory Clark, 2015
Security from Zero: Practical Security for Busy People
Eric Higgins, 2020
Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... Systems and Computing (1147), Band 1147)
Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor), 2020
Android Security Internals: An In-Depth Guide to Android's Security Architecture
Nikolay Elenkov, 2014
Android Security Internals: An In-Depth Guide to Android's Security Architecture
Nikolay Elenkov, 2014
Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Advances in Information Security, Privacy, and Ethics)
Padmavathi Ganapathi (editor), D. Shanmugapriya (editor), 2020
Exploring Security in Software Architecture and Design (Advances in Information Security, Privacy, and Ethics)
Michael Felderer (editor), Riccardo Scandariato (editor), 2018
Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications)
Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu, 2020
Mastering Azure Security: Safeguard your Azure workload with innovative cloud security measures
Mustafa Toroman, Tom Janetscheck, 2020
CYBER SECURITY: Ultimate Beginners Guide to Learn the Basics and Effective Methods of Cyber Security (An Essential Guide to Ethical Hacking for Beginners)
STEVEN, MICHAEL; STEVEN, MICHAEL, 2019
Practical internet of things security : design a security framework for an Internet connected ecosystem
Brian Russell; Drew Van Duren, 2018
Android Security Internals: An In-Depth Guide to Android's Security Architecture
Nikolay Elenkov, 2014
Insuring Security: Biopolitics, Security And Risk
Luis Lobo-Guerrero, 2011
Information Security Program Guide: Company Policies, Departmental Procedures, IT Standards & Guidelines
Resource, Cyber Security, 2021
Automated Security Analysis of Android and iOS Applications with Mobile Security Framework
Henry Dalziel, Ajin Abraham, 2015
Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas
Carolyn Mae Kim; Robert H Deatherage Jr, 2021
Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data
Mark Talabis, Robert McPherson, Inez Miyamoto, Jason Martin, 2014
