Search ResultsElectronic Resources
Limit Search Results
Material Type
Language
Publication Date
-
Library
Shelf Location
9 Results Found Subscribe to search results
000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Gomzin, Slava.
      Format: 
      Excerpt: 
      part I. Anatomy of payment application vulnerability -- part II. Attacks on point-of-sale systems
      by 
      Kraus, Rob.
      Format: 
      Excerpt: 
      exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make
      by 
      Haines, Brad.
      Format: 
      Excerpt: 
      Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get
      by 
      Anderson, Brian (Brian James)
      Format: 
      Excerpt: 
      specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You
      by 
      Timm, Carl.
      Format: 
      Excerpt: 
      exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these
      by 
      Zalewski, Michal.
      Format: 
      Excerpt: 
      pt. 1. Anatomy of the web -- pt. 2. Browser security features -- pt. 3. A glimpse of things to come.
      by 
      Ben-Natan, Ron.
      Format: 
      Excerpt: 
      many sections which outline the anatomy of an attack before delving into the details of how to combat
      by 
      Stefanek, George L.
      Format: 
      Excerpt: 
      Preface -- Ch. 1 Information Security Attacks And Vulnerabilities -- Ch. 2 Anatomy Of An Attack
      by 
      Long, Johnny.
      Format: 
      Excerpt: 
      -- Chapter 7: Google and P2P Hacking -- Chapter 8: Anatomy of a Break-In.