Компьютерная безопасность. Хакерство
Всего: 1154
Chris Hurley, Michael Puchol, Russ Rogers, Frank Thornton
WarDriving: Drive, Detect, Defend, A Guide to Wireless Security
Charles P. Pfleeger, Shari Lawrence Pfleeger
Security in Computing, Third Edition
Robert B. Gelman, Gelman, Stanton McCandlish, Electronic Frontier Foundation
Protecting Yourself Online: The Definitive Resource on Safety, Freedom, and Privacy in Cyberspace
Christopher J. Alberts, Audrey J. Dorofee
Managing Information Security Risks: The OCTAVE Approach
Andrew Frackman, Claudia Ray, Rebecca Martin
Internet and Online Privacy: A Legal and Business Guide
Анатолий Зубов
Совершенные шифры
Dmitry Bokotey, Andrew Mason, Raymond Morrow
CCIE Practical Studies: Security (CCIE Self-Study)
Ryan Russell, Ido Dubrawsky, FX, Joe Grand, Tim Mullen
Stealing the Network: How to Own the Box
Barry J. Stiefel, Doug Maxwell, Kyle X. Hourihan, Cherie Amon, James Noble
Check Point NG VPN-1/Firewall-1: Advanced Configuration and Troubleshooting
James A. Whittaker, Herbert H. Thompson
How to Break Software Security
Christopher Gerg, Kerry J. Cox
Managing Security with Snort and IDS Tools
Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin
Enterprise Java 2 Security: Building Secure and Robust J2EE Applications
Cherie Amon, Allen V. Keele, Даниель Клигерман, Дрю Симонис, Corey Pincock
Check Point Next Generation Security Administration
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20