نتایج جستجو
How to Break Web Software: Functional and Security Testing of Web Applications and Web Services. Book & CD
Mike Andrews, James A. Whittaker, 2006
The Open Web Application Security Project (OWASP) Testing Guide v3.0
Matteo Meucci, 2008
BackTrack 4: Assuring Security by Penetration Testing
Shakeel Ali, Tedi Heriyanto, 2011
BackTrack 4: Assuring Security by Penetration Testing
Shakeel Ali, Tedi Heriyanto, 2011
BackTrack 4: Assuring Security by Penetration Testing
Shakeel Ali, Tedi Heriyanto, 2011
BackTrack 4: Assuring Security by Penetration Testing: Master the art of penetration testing with BackTrack
Shakeel Ali, Tedi Heriyanto, 2
The web application hacker's handbook: discovering and exploiting security flaws
Dafydd Stuttard, Marcus Pinto, 2007
The web application hacker's handbook: discovering and exploiting security flaws
Dafydd Stuttard, Marcus Pinto, 2007
The web application hacker's handbook: finding and exploiting security flaws
Dafydd Stuttard, Marcus Pinto, 2011
The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws
Dafydd Stuttard, Marcus Pinto, 2011
Linux Server Security
Michael Bauer D., 2005
Brazil’s Emerging Role in Global Governance: Health, Food Security and Bioenergy
Markus Fraundorfer (auth.), 2015
Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings
Liang Xie, Hui Song, Suncun Zhu (auth.), Steven M. Bellovin, Rosario Gennaro, Angelos Keromytis, Moti Yung (eds.), 2008
Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings
Liang Xie, Hui Song, Suncun Zhu (auth.), Steven M. Bellovin, Rosario Gennaro, Angelos Keromytis, Moti Yung (eds.), 2008
Application of Big Data for National Security: A Practitioner's Guide to Emerging Technologies
Babak Akhgar, Gregory B. Saathoff, Hamid R. Arabnia, Richard Hill, Andrew Staniforth, Petra Saskia Bayerl, 2015
Beherrschbarkeit von Cyber Security, Big Data und Cloud Computing: Tagungsband zur dritten EIT ICT Labs-Konferenz zur IT-Sicherheit
Udo Bub, Klaus-Dieter Wolfenstetter (eds.), 2014
Guidelines for Analyzing and Managing the Security Vulnerabilities of Fixed Chemical Sites (CCPS Guidelines)
Center for Chemical Process Safety (CCPS), 2003
Guidelines for Chemical Transportation Safety, Security, and Risk Management
Center for Chemical Process Safety (CCPS), 2008
