Search ResultsElektronik Kaynaklar 
Arama Sonuçlarını Sınırlandır
by
Mansourov, Nikolai.
ScienceDirect https://www.sciencedirect.com/science/book/9780123814142
Format:
Alıntı:
Why Hackers know more about our systems -- Confidence as a Product -- How to Build Confidence
by
Cross, Michael, 1965-
ScienceDirect http://www.sciencedirect.com/science/book/9781597490610
Format:
Alıntı:
. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use
by
Baskin, Brian.
ScienceDirect https://www.sciencedirect.com/science/book/9781597490559
Format:
Alıntı:
will cover real techniques from the computer programmers and hackers to bend and tweak the program to
by
Long, Johnny.
ScienceDirect https://www.sciencedirect.com/science/book/9781597490214
Format:
Alıntı:
the tools used by malicious hackers and penetration testers * The book is authored by many of the tool
by
Harrington, Jan L.
ScienceDirect https://www.sciencedirect.com/science/book/9780123116338
Format:
Alıntı:
, rewards, and trade-offs related implementing security measures. + Helps you see through a hacker's eyes so
by
Chandra, Praphul.
ScienceDirect http://www.sciencedirect.com/science/book/9780750677462
Format:
Alıntı:
desirable feature--instead, it's a necessity to protect essential personal and business data from hackers
by
Long, Johnny.
ScienceDirect http://www.sciencedirect.com/science/book/9781931836364
Format:
Alıntı:
! -- Document grinding and database digging -- Protecting yourself from Google hackers -- Automating Google
by
Foster, James C.
ScienceDirect http://www.sciencedirect.com/science/book/9781932266672
Format:
Alıntı:
/>*This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's
by
Barber, Brian.
ScienceDirect https://www.sciencedirect.com/science/book/9781597490276
Format:
Alıntı:
malicious hackers. * Only book available on Microsoft's brand new, Windows Server Update Services * Employs
by
Parker, Tom.
ScienceDirect http://www.sciencedirect.com/science/book/9781931836111
Format:
Alıntı:
will demonstrate the motives and motivations of criminal hackers through profiling attackers at post
ScienceDirect http://www.sciencedirect.com/science/book/9781932266863
Format:
Alıntı:
characters that control the flow of money as well as the hackers and programmers committed to keeping the
by
Black, Sharon K.
ScienceDirect http://www.sciencedirect.com/science/book/9781558605466
ScienceDirect https://www.sciencedirect.com/science/book/9781558605466
ScienceDirect https://www.sciencedirect.com/science/book/9781558605466
Format:
Alıntı:
telecommunications law. * Offers guidance on fending off legal and illegal attacks by hackers, competitors, and

Eylem Seç




