Компьютерная безопасность. Хакерство
Всего: 1154
David Ferbrache, Gavin Shearer
Unix Installation Security and Integrity
Gordon F. Snyder
Network Security
International Conference on the Theory and Application of Cryptology A, C. Xing, E. Okamoto, G. Goos, J. Hartmanis, J. Van Leeuwen, K.Y. Lam, Kwok Yan Lam, Eiji Okamato, Chaoping Xing
Advances in Cryptology - Asiacrypt'99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings (Lecture Notes in Computer Science, 1716)
F.-A. Allaert, Bernd Blobel, Lees Louwerse, Barry Barber, Francois-Andre Allaert
Security Standards for Healthcare - MEDSEC
James Michael Stewart
Security+ Fast Pass
John Mallery, Jason Zann, Patrick Kelly, Robert McMullin, John Mallery, Robert McMullin, Patrick Kelly, Jason Zann, Paul Love
Hardening Network Security
Art Conklin, Gregory White, Chuck Cothren, Dwayne Williams, Roger L. Davis, Art Conklin, Gregory White, Chuck Cothren, Dwayne Williams, Roger Davis
Principles of Computer Security: Security and Beyond
Eric Cole, Mathew Newfield, John M. Millican, Стивен Норткатт
SANS GIAC Certification: Security Essentials Toolkit (GSEC)
Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes
Linux Security Cookbook
Jack Koziol, David Litchfield, Dave Aitel, Chris Anley, Sinan "noir" Eren, Neel Mehta, Riley Hassell
The Shellcoder's Handbook : Discovering and Exploiting Security Holes
Sun Microsystems Inc
Migration Guide
Sun Microsystems Inc
Deployment Guide
Simson Garfinkel, Gene Spafford
Web Security & Commerce (O'Reilly Nutshell)
Dick Thornburgh, Herbert S. Lin, Herbert Lin, National Research Council
Youth, Pornography and the Internet
Jae K. Shim, Anique A. Qureshi, Joel G. Siegel
The International Handbook of Computer Security
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20