Search ResultsElektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Yazar
Materyal Türü
Dil
Konu
Kütüphane
Liste görünümüne geç
Küçük resim görünümüne geç
122 sonuç bulundu Arama sonuçlarına abone ol
000000000000DEFAULTTR
Yazdır
Liste seç
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
    Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
      by 
      Lastowka, F. Gregory.
      Format: 
      Alıntı: 
      Law -- History -- Landscape -- Regulation -- Jurisdiction -- Games -- Property -- Hackers
      by 
      Sheetz, Michael.
      Format: 
      Alıntı: 
      -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker
      by 
      Cross, Michael, 1965-
      Format: 
      Alıntı: 
      achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit
      by 
      Baskin, Brian.
      Format: 
      Alıntı: 
      and network of malicious hackers and criminals.
      by 
      Mandiberg, Michael.
      Format: 
      Alıntı: 
      democracy / C.W. Anderson -- Humor -- Phreakers, hackers, and trolls and the politics of transgression and
      by 
      Heiderich, Mario.
      Format: 
      Alıntı: 
      popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create
      by 
      Rathaus, Noam.
      Format: 
      Alıntı: 
      --before hackers do it! Open Source Fuzzing Tools is the first book to market that covers the subject of
      by 
      Porter, Thomas.
      Format: 
      Alıntı: 
      one of these new VoIP phone lines and handsets must now be protected from malicious hackers because
      by 
      Carrington, Charles (Charles Dudley)
      Format: 
      Alıntı: 
      potential "hackers." If the directory structure is compromised, then the whole enterprise can be at risk
      by 
      Traxler, Julie.
      Format: 
      Alıntı: 
      programmers how to design tight code that will deter hackers from the word go. Comes with up-to-the-minute web
      by 
      Miles, Wyman.
      Format: 
      Alıntı: 
      security professionals and self-proclaimed hackers, this book will give system administrators the edge they
      by 
      Noutoua, Jean Sylvestre, author.
      Format: 
      Alıntı: 
      threats and vulnerabilities yielded the following themes: internal users. hackers, malware, physical
      Go to:Search Results
      |
      Search Facets
      |
      Top of Page