Компьютеры: прочее

500 кн.
The Art of Intrusion. The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
The Art of Intrusion. The Real Stor...
Malicious Cryptography. Exposing Cryptovirology
Malicious Cryptography. Exposing Cr...
Unauthorised Access. Physical Penetration Testing For IT Security Teams
Unauthorised Access. Physical Penet...
Hack Attacks Testing. How to Conduct Your Own Security Audit
Hack Attacks Testing. How to Conduc...
Mission-Critical Security Planner. When Hackers Won't Take No for an Answer
Mission-Critical Security Planner....
The Oracle Hacker's Handbook. Hacking and Defending Oracle
The Oracle Hacker's Handbook. Hacki...
Schneier on Security
Schneier on Security
Network Security Bible
Network Security Bible
Computer Forensics For Dummies
Computer Forensics For Dummies
Network Security Foundations. Technology Fundamentals for IT Success
Network Security Foundations. Techn...
Phishing Dark Waters. The Offensive and Defensive Sides of Malicious Emails
Phishing Dark Waters. The Offensive...
The Browser Hacker's Handbook
The Browser Hacker's Handbook
Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics...
The Best of 2600, Collector's Edition. A Hacker Odyssey
The Best of 2600, Collector's Editi...
Cloud Security. A Comprehensive Guide to Secure Cloud Computing
Cloud Security. A Comprehensive Gui...
Malware Analyst's Cookbook and DVD. Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD....
Cryptography Engineering. Design Principles and Practical Applications
Cryptography Engineering. Design Pr...
Web Commerce Security. Design and Development
Web Commerce Security. Design and D...
Predicting Malicious Behavior. Tools and Techniques for Ensuring Global Security
Predicting Malicious Behavior. Tool...
Unmasking the Social Engineer. The Human Element of Security
Unmasking the Social Engineer. The...
Fabricated. The New World of 3D Printing
Fabricated. The New World of 3D Pri...
Carry On. Sound Advice from Schneier on Security
Carry On. Sound Advice from Schneie...
Microsoft Windows Security Essentials
Microsoft Windows Security Essentia...
Implementing SSL / TLS Using Cryptography and PKI
Implementing SSL / TLS Using Crypto...
Для правообладателей и по всем вопросам knigism.info@yandex.ru