نتایج جستجو
Android : guida alla sicurezza per hacker e sviluppatori
Elenkov, Nikolay, 2015
CEH Certified Ethical Hacker Study Guide
Kimberly Graves, 2010
CEH v9 Certified Ethical Hacker Version 9 Study Guide
Sean-Philip Oriyano, 2016
CEH: Official Certified Ethical Hacker Review Guide
Kimberly Graves, 2007
CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
Kimberly Graves, 2007
Certified Ethical Hacker Exam Prep
Michael Gregg, 2006
Cyber Adversary Characterization: Auditing the Hacker Mind
Parker T., Sachs M., Shaw E., 2004
Cyber Adversary Characterization: Auditing the Hacker Mind
Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz, Matthew G. Devost, 2004
Defeating the Hacker: A Non-Technical Guide to Computer Security
Robert Schifreen, 2006
Die Hacker-Bibel
Ryan Russell, 2002
Firewalls and Internet Security: Repelling the Wily Hacker
William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin, 2003
Firewalls and Internet Security: Repelling the Wily Hacker
William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin, 2003
Google A Hacker's Best Friend
McClure, Stuart.
Gray Hat Hacking - The Ethical Hacker's Handbook
Shon Harris, Allen Harper, Chris Eagle, and Jonathan Ness, 2008
Gray Hat Hacking The Ethical Hacker's Handbook
Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims, 2015
Hack proofing your Web applications: the only way to stop a hacker is to think like one
L. Brent Huston, Teri Bidwell, Ryan Russell, Robin Walshaw, Oliver Steudler, 2001
Hacker Attack
Richard Mansfield, 2006
Hacker Crackdown, the
Bruce Sterling, 1993
Hacker culture
Douglas Thomas, 2002
Hacker Disassembling Uncovered
Kris Kaspersky, 2003
