Компьютеры: прочее

1300 кн.
Network Security Bible
Network Security Bible
Schneier on Security
Schneier on Security
The Oracle Hacker's Handbook. Hacking and Defending Oracle
The Oracle Hacker's Handbook. Hacki...
Mission-Critical Security Planner. When Hackers Won't Take No for an Answer
Mission-Critical Security Planner....
Hack Attacks Testing. How to Conduct Your Own Security Audit
Hack Attacks Testing. How to Conduc...
Unauthorised Access. Physical Penetration Testing For IT Security Teams
Unauthorised Access. Physical Penet...
Malicious Cryptography. Exposing Cryptovirology
Malicious Cryptography. Exposing Cr...
The Art of Intrusion. The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
The Art of Intrusion. The Real Stor...
The Death of the Internet
The Death of the Internet
Wireless Mobile Internet Security
Wireless Mobile Internet Security
Cybercrime and Cyber Warfare
Cybercrime and Cyber Warfare
Public Key Cryptography. Applications and Attacks
Public Key Cryptography. Applicatio...
IP Address Management Principles and Practice
IP Address Management Principles an...
Data-Driven Security. Analysis, Visualization and Dashboards
Data-Driven Security. Analysis, Vis...
Information Security. Principles and Practice
Information Security. Principles an...
CompTIA PenTest+ Study Guide. Exam PT0-001
CompTIA PenTest+ Study Guide. Exam...
Кибертормоз
Кибертормоз
Na tropie błędów. Przewodnik hakerski
Na tropie błędów. Przewodnik hakers...
Guia Para Iniciantes Em Hacking De Computadores
Guia Para Iniciantes Em Hacking De...
VMware Certified Advanced Professional - Datacenter Design (VCAP-DCD) Secrets To Acing The Exam and Successful Finding And Landing Your Next VMware Certified Advanced Professional - Datacenter Design (VCAP-DCD) Certified Job
VMware Certified Advanced Professio...
Hardware-based Computer Security Techniques to Defeat Hackers
Hardware-based Computer Security Te...
PMP Secrets To Acing The Exam and Successful Finding And Landing Your Next PMP Certified Job
PMP Secrets To Acing The Exam and S...
Security Engineering
Security Engineering
Information Security Governance
Information Security Governance