Компьютерная безопасность. Хакерство
Всего: 1154
H. X. Mel, Doris M. Baker
Cryptography Decrypted
Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
Building Internet Firewalls (2nd Edition)
Ajay Gupta, Scott Laliberte
Defend I.T. : Security by Example
George Mohay, Alison Anderson, Byron Collie, Olivier de Vel, Rod McKemmish
Computer and Intrusion Forensics (Artech House Computer Security Series)
Richard Hundley, Robert Anderson, John Arquilla, Roger Molander, Rand Corporation, Ditchley Foundation
Security in Cyberspace: Challenges for Society: Proceedings of an Internation Conference
Arnaud de Borchgrave, Frank J. Cilluffo, Sharon L. Cardash, Michele Ledgerwood, Csis Homeland Defense Project
Cyber Threats and Information Security: Meeting the 21st Century Challenge (Csis Report)
Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz, Matthew G. Devost
Cyber Adversary Characterization: Auditing the Hacker Mind
Simone Fischer-Hubner
IT-Security & Privacy
Borka Jerman-Blazic, Wolfgang S. Schneider, Tomaz Klobucar, NATO ADVANCED NETWORKING WORKSHOP ON ADV
Advanced Security Technologies in Networking (Nato-Computer and Systems Sciences, 178)
Andrew Gauntlett, Sheena Dewan
Net Spies
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20