نتایج جستجو
Android Security Internals: An In-Depth Guide to Android’s Security Architecture
Nikolay Elenkov, 2014
Beautiful Security: Leading Security Experts Explain How They Think
Andy Oram; John Viega, 2009
Android Security Internals: An In-Depth Guide to Android’s Security Architecture
Nikolay Elenkov, 2014
Deviant Security - The Technical Computer Security Practices of Cyber Criminals
Eric Van De Sandt, 2019
Pro Azure Governance and Security: A Comprehensive Guide to Azure Policy, Blueprints, Security Center, and Sentinel
Peter De Tender, David Rendon, Samuel Erskine, 2019
On Watch : Profiles from the National Security Agency's Past 40 Years
National Security Agency, 2016
Computer Security Divsion Annual Report 2015
Computer Security Divsion NIST, 2016
Implementing An Information Security Management System: Security Management Based On ISO 27001 Guidelines
Abhishek Chopra, Mukund Chaudhary, 2020
Cyber Security: This book includes: Kali Linux for Hackers and Hacker Basic Security
Erickson Karnel, 2019
Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment
Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler, 2020
Offensive Security OSCP
Offensive Security, 2020
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges
Qing Li; Gregory Clark, 2015
Security from Zero: Practical Security for Busy People
Eric Higgins, 2020
Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... Systems and Computing (1147), Band 1147)
Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor), 2020
Android Security Internals: An In-Depth Guide to Android's Security Architecture
Nikolay Elenkov, 2014
