Поиск:
Войти
An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on t…
An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on t…
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook…
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook…
Добавлено
Год выхода: 2017
Язык: Английский
Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide…
Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide…
Добавлено
Год выхода: 2018
Язык: Английский
Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Huma…
Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Huma…
Добавлено
Год выхода: 2018
Язык: Английский
This much-anticipated revision, written by the ultimate group of top security experts in the world, …
This much-anticipated revision, written by the ultimate group of top security experts in the world, …
Добавлено
Год выхода: 2018
Язык: Английский
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech secur…
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech secur…
A top-level security guru for both eBay and PayPal and a best-selling information systems security a…
A top-level security guru for both eBay and PayPal and a best-selling information systems security a…
Добавлено
Год выхода: 2018
Язык: Английский
The ultimate guide to cryptography, updated from an author team of the world's top cryptography expe…
The ultimate guide to cryptography, updated from an author team of the world's top cryptography expe…
Добавлено
Год выхода: 2018
Язык: Английский
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Dece…
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Dece…
Become a cyber-hero – know the common wireless weaknesses «Reading a book like this one is a worthy …
Become a cyber-hero – know the common wireless weaknesses «Reading a book like this one is a worthy …
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, …
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, …
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Comput…
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Comput…
What an amazing world we live in! Almost anything you can imagine can be researched, compared, admir…
What an amazing world we live in! Almost anything you can imagine can be researched, compared, admir…
Добавлено
Год выхода: 2018
Язык: Английский
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the…
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the…
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to pro…
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to pro…
World-class preparation for the new PenTest+ exam The CompTIA PenTest+ Study Guide: Exam PT0-001 off…
World-class preparation for the new PenTest+ exam The CompTIA PenTest+ Study Guide: Exam PT0-001 off…
Must-have guide for professionals responsible for securing credit and debit card transactions As rec…
Must-have guide for professionals responsible for securing credit and debit card transactions As rec…
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Inte…
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Inte…
This concise and practical book shows where code vulnerabilities lie-without delving into the specif…
This concise and practical book shows where code vulnerabilities lie-without delving into the specif…
Most security books are targeted at security engineers and specialists. Few show how build security …
Most security books are targeted at security engineers and specialists. Few show how build security …
Популярные книги



































