Search ResultsElectronic Resources 
by
Gomzin, Slava.
Format:
Excerpt:
part I. Anatomy of payment application vulnerability -- part II. Attacks on point-of-sale systems
by
Kraus, Rob.
ScienceDirect https://www.sciencedirect.com/science/book/9781597495516
Format:
Excerpt:
exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make
by
Haines, Brad.
ScienceDirect https://www.sciencedirect.com/science/book/9781597495417
Format:
Excerpt:
Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get
by
Anderson, Brian (Brian James)
ScienceDirect https://www.sciencedirect.com/science/book/9781597495530
Format:
Excerpt:
specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You
by
Timm, Carl.
ScienceDirect https://www.sciencedirect.com/science/book/9781597495455
Format:
Excerpt:
exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these
by
Zalewski, Michal.
Format:
Excerpt:
pt. 1. Anatomy of the web -- pt. 2. Browser security features -- pt. 3. A glimpse of things to come.
by
Ben-Natan, Ron.
ScienceDirect http://www.sciencedirect.com/science/book/9781555583347
Format:
Excerpt:
many sections which outline the anatomy of an attack before delving into the details of how to combat
by
Stefanek, George L.
ScienceDirect https://www.sciencedirect.com/science/book/9781878707963
Format:
Excerpt:
Preface -- Ch. 1 Information Security Attacks And Vulnerabilities -- Ch. 2 Anatomy Of An Attack
by
Long, Johnny.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492157
Format:
Excerpt:
-- Chapter 7: Google and P2P Hacking -- Chapter 8: Anatomy of a Break-In.

Select an Action





