Security related eBooks
English | 5 Mar. 2004 | ISBN: 0520229878, 0520240766 | 330 Pages | PDF | 2 MB In this rare firsthand account, Lorna Rhodes takes us into a hidden world that lies at the heart of the maximum security p...
( Category:Security related Date:04 Apr 2016 )
English | 1 Jun. 2004 | ISBN: 1931769338 | 300 Pages | CHM | 8 MB A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods co...
( Category:Security related Date:02 Apr 2016 )
English | 28 Sept. 2009 | ISBN: 0754677273 | 284 Pages | PDF | 3 MB Maritime security is of vital importance to the South China Sea, a critical sea route for maritime transport of East Asian countries...
( Category:Security related Date:01 Apr 2016 )
Spanish | 25 Oct. 2006 | ISBN: 8480195878 | 159 Pages | PDF | 1 MB Muchas personas sienten tal miedo al agua que no s¨Žlo les priva del placer del ba?o, sino que les impide aprender a nadar. Este libro...
( Category:Security related Date:01 Apr 2016 )
2002 | 159 Pages | ISBN: 020171955X | PDF | 15.4 MB Most home computer users and small businesses maintain no real, effective security on their Internet-exposed home computers or networks. Have You Lo...
( Category:Security related Date:31 Mar 2016 )
English | Mar 7, 2016 | ISBN: 9384464821 | 232 Pages | AZW3/MOBI/EPUB/PDF (conv) | 8.86 MB Each era brings with it new techniques and methods of waging a war. While military scholars and experts have ...
( Category:Security related Date:31 Mar 2016 )
Publisher: Addison-Wesley Professional | 2012 | ISBN: 0321812573 | 432 Pages | PDF | (5,5 + 7,9) MB Since 2001, the CERTInsider Threat Center at Carnegie Mellon University's Software Engineering Insti...
( Category:Security related Date:31 Mar 2016 )
2005 | 288 Pages | ISBN: 038726194X | PDF | 14.7 MB Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue te...
( Category:Security related Date:31 Mar 2016 )
2007 | ISBN: 159693218X | English | 224 Pages | PDF | 2.8 MB Role engineering secures information systems. It ensures that every user has the right permission to access just the right information, com...
( Category:Security related Date:31 Mar 2016 )
English | 6 Sept. 2002 | ISBN: 0471496146, 0470849231 | 428 Pages | PDF | 19 MB Since the publication of the successful first edition of Earthquake Protection there have been 110 lethal earthquakes, k...
( Category:Security related Date:29 Mar 2016 )
Publisher: No Starch Press | 2011 | ISBN: 1593273886 | 320 Pages | PDF | (4 + 1,9) MB Modern web applications are built on a tangle of technologies that have been developed over time and then haphazar...
( Category:Security related Date:29 Mar 2016 )
English | ISBN: 0134052013 | 2016 | 448 Pages | EPUB | 15 MB Security Operations Center Building, Operating, and Maintaining Your SOC The complete, practical guide to planning, building, and operating...
( Category:Security related Date:29 Mar 2016 )
2014 | ISBN: 1593275811 | English | 432 Pages | EPUB | 4 MB "I honestly didn't believe I'd learn much from the book because I've been working on Android security for many years. This belief could not ...
( Category:Security related Date:28 Mar 2016 )
2013 | ISBN: 0321822137 | English | 600 Pages | EPUB | 16 MB Learn the Root Causes of Software Vulnerabilities and How to Avoid Them Commonly exploited software vulnerabilities are usually caused by a...
( Category:Security related Date:28 Mar 2016 )
Publisher: Packt Publishing | 2012 | ISBN: 1849517428 | 268 Pages | PDF | (4,9 + 4,8 + 5,2) MB Metasploitsoftware helps security and IT professionals identify security issues, verify vulnerability mit...
( Category:Security related Date:26 Mar 2016 )