Search ResultsElektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Yazar
Materyal Türü
Dil
Konu
Kütüphane
122 sonuç bulundu Arama sonuçlarına abone ol
000000000000DEFAULTTR
Yazdır
Liste seç
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
    Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
      by 
      Mansourov, Nikolai.
      Format: 
      Alıntı: 
      Why Hackers know more about our systems -- Confidence as a Product -- How to Build Confidence
      by 
      Cross, Michael, 1965-
      Format: 
      Alıntı: 
      . Through a review of recent Web application breaches, the book will expose the prolific methods hackers use
      by 
      Baskin, Brian.
      Format: 
      Alıntı: 
      will cover real techniques from the computer programmers and hackers to bend and tweak the program to
      by 
      Long, Johnny.
      Format: 
      Alıntı: 
      the tools used by malicious hackers and penetration testers * The book is authored by many of the tool
      by 
      Harrington, Jan L.
      Format: 
      Alıntı: 
      , rewards, and trade-offs related implementing security measures. + Helps you see through a hacker's eyes so
      by 
      Chandra, Praphul.
      Format: 
      Alıntı: 
      desirable feature--instead, it's a necessity to protect essential personal and business data from hackers
      by 
      Long, Johnny.
      Format: 
      Alıntı: 
      ! -- Document grinding and database digging -- Protecting yourself from Google hackers -- Automating Google
      by 
      Foster, James C.
      Format: 
      Alıntı: 
      />*This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's
      by 
      Barber, Brian.
      Format: 
      Alıntı: 
      malicious hackers. * Only book available on Microsoft's brand new, Windows Server Update Services * Employs
      by 
      Parker, Tom.
      Format: 
      Alıntı: 
      will demonstrate the motives and motivations of criminal hackers through profiling attackers at post
      Format: 
      Alıntı: 
      characters that control the flow of money as well as the hackers and programmers committed to keeping the
      by 
      Black, Sharon K.
      Format: 
      Alıntı: 
      telecommunications law. * Offers guidance on fending off legal and illegal attacks by hackers, competitors, and