Search ResultsElektronik Kaynaklar
by
Lastowka, F. Gregory.
Format:
Alıntı:
Law -- History -- Landscape -- Regulation -- Jurisdiction -- Games -- Property -- Hackers
by
Sheetz, Michael.
Format:
Alıntı:
-- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker
by
Cross, Michael, 1965-
ScienceDirect http://www.sciencedirect.com/science/book/9781597492096
Format:
Alıntı:
achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit
by
Baskin, Brian.
ScienceDirect https://www.sciencedirect.com/science/book/9781597490641
Format:
Alıntı:
and network of malicious hackers and criminals.
by
Mandiberg, Michael.
Format:
Alıntı:
democracy / C.W. Anderson -- Humor -- Phreakers, hackers, and trolls and the politics of transgression and
by
Heiderich, Mario.
Format:
Alıntı:
popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create
by
Rathaus, Noam.
ScienceDirect http://www.sciencedirect.com/science/book/9781597491952
Format:
Alıntı:
--before hackers do it! Open Source Fuzzing Tools is the first book to market that covers the subject of
by
Porter, Thomas.
ScienceDirect https://www.sciencedirect.com/science/book/9781597490603
Format:
Alıntı:
one of these new VoIP phone lines and handsets must now be protected from malicious hackers because
by
Carrington, Charles (Charles Dudley)
ScienceDirect http://www.sciencedirect.com/science/book/9780121604523
Format:
Alıntı:
potential "hackers." If the directory structure is compromised, then the whole enterprise can be at risk
by
Traxler, Julie.
ScienceDirect https://www.sciencedirect.com/science/book/9781928994312
Format:
Alıntı:
programmers how to design tight code that will deter hackers from the word go. Comes with up-to-the-minute web
by
Miles, Wyman.
ScienceDirect http://www.sciencedirect.com/science/book/9781928994442
Format:
Alıntı:
security professionals and self-proclaimed hackers, this book will give system administrators the edge they
by
Noutoua, Jean Sylvestre, author.
Format:
Alıntı:
threats and vulnerabilities yielded the following themes: internal users. hackers, malware, physical




