نتایج جستجو
Security Careers. Skills, Compensation, and Career Paths
Stephen W. Walker and James E. Foushée (Auth.), 2014
Breaking into information security : crafting a custom career path to get the job you really want
Liu, Chris; More, Josh; Stieber, Anthony J, 2015
Cloud Computing: Implementation, Management, and Security
John Rittinghouse, James Ransome, 2009
Cloud Computing: Implementation, Management, and Security
John Rittinghouse, James Ransome, 2009
Cloud Computing: Implementation, Management, and Security
John Rittinghouse, James Ransome, 2009
Cloud Computing: Implementation, Management, and Security
John Rittinghouse, James Ransome, 2009
Molecular Imaging: Computer Reconstruction and Practice (NATO Science for Peace and Security Series B: Physics and Biophysics)
Yves Lemoigne, Alessandra Caner, 2008
How to Break Web Software: Functional and Security Testing of Web Applications and Web Services. Book & CD
Mike Andrews, James A. Whittaker, 2006
The Open Web Application Security Project (OWASP) Testing Guide v3.0
Matteo Meucci, 2008
BackTrack 4: Assuring Security by Penetration Testing
Shakeel Ali, Tedi Heriyanto, 2011
BackTrack 4: Assuring Security by Penetration Testing
Shakeel Ali, Tedi Heriyanto, 2011
BackTrack 4: Assuring Security by Penetration Testing
Shakeel Ali, Tedi Heriyanto, 2011
BackTrack 4: Assuring Security by Penetration Testing: Master the art of penetration testing with BackTrack
Shakeel Ali, Tedi Heriyanto, 2
The web application hacker's handbook: discovering and exploiting security flaws
Dafydd Stuttard, Marcus Pinto, 2007
The web application hacker's handbook: discovering and exploiting security flaws
Dafydd Stuttard, Marcus Pinto, 2007
The web application hacker's handbook: finding and exploiting security flaws
Dafydd Stuttard, Marcus Pinto, 2011
The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws
Dafydd Stuttard, Marcus Pinto, 2011
Linux Server Security
Michael Bauer D., 2005
Brazil’s Emerging Role in Global Governance: Health, Food Security and Bioenergy
Markus Fraundorfer (auth.), 2015
Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings
Liang Xie, Hui Song, Suncun Zhu (auth.), Steven M. Bellovin, Rosario Gennaro, Angelos Keromytis, Moti Yung (eds.), 2008
