LitRes
Otsi
Sisestage otsimiseks kolm või enam tähte
Logi sisse
6
Kas teadsite, et...
LitResiga liitudes näitate hoolivust keskkonna suhtes
Registreeru
Logi sisse
Minu raamatud
Minu raamatud
Ostukorv
Loendid
Meist
Ettevõttest & Kontakt
Žanrid
Uued
Populaarsed
Audioraamatud
Soovitused
Sooduskood
Kõik 345 žanrit
Raamatud
Teadmised ja oskused
Arvutid
Информационная безопасность
Информационная безопасность
Alažanrid
Tase kõrgemal
(Arvutid)
Uued
Populaarsed
E-raamatud ja audioraamatud
E-raamatud ja audioraamatud
E-raamatud
460
Audioraamatud
107
kõigis keeltes
574
hispaania keeles
1
inglise keeles
52
itaalia keeles
1
portugali keeles
1
prantsuse keeles
1
vene keeles
518
Information Security. Principles and Practice
Mark Stamp
0
Public Key Cryptography. Applications and Attacks
Lynn Batten Margaret
0
Virtualization of information object vulnerability testing container based on DeX technology and deep learning neural networks
Б. В. Окунев
0
Hacking Point of Sale
0
Cryptology Unlocked
Reinhard Wobst
0
Security Patterns
Eduardo Fernandez-Buglioni
0
Hacking For Dummies
Kevin Beaver
0
Wireshark for Security Professionals. Using Wireshark and the Metasploit Framework
Jeff Parker T.
1
Innocent Code
0
Cybercrime and Cyber Warfare
Igor Bernik
0
Hack Attacks Testing. How to Conduct Your Own Security Audit
John Chirillo
2
Mission-Critical Security Planner. When Hackers Won't Take No for an Answer
Eric Greenberg
0
Secrets and Lies
0
Hardware-based Computer Security Techniques to Defeat Hackers
Roger Dube R.
0
Internet Security
0
Wireless Mobile Internet Security
Man Rhee Young
0
Predicting Malicious Behavior. Tools and Techniques for Ensuring Global Security
Gary Jackson M.
0
Cryptography and Public Key Infrastructure on the Internet
0
CompTIA PenTest+ Study Guide. Exam PT0-001
Mike Chapple
0
Security Engineering
0
Malware Analyst's Cookbook and DVD. Tools and Techniques for Fighting Malicious Code
Michael Ligh
0
Computer Security and Cryptography
0
CASP CompTIA Advanced Security Practitioner Study Guide. Exam CAS-002
Michael Gregg
0
Information Security Governance
0
Network Security Bible
Eric Cole
0
Information Security
0
Hacking For Dummies
Kevin Beaver
1
Applied Cryptanalysis
Richard Low M.
0
The Death of the Internet
Markus Jakobsson
2
IP Address Management Principles and Practice
Timothy Rooney
0
Phishing Dark Waters. The Offensive and Defensive Sides of Malicious Emails
Кристофер Хэднеги
1
Cryptography Engineering. Design Principles and Practical Applications
Брюс Шнайер
1
Implementing SSL / TLS Using Cryptography and PKI
Joshua Davies
0
Carry On. Sound Advice from Schneier on Security
Брюс Шнайер
0
CompTIA CSA+ Study Guide. Exam CS0-001
Mike Chapple
0
The Best of 2600, Collector's Edition. A Hacker Odyssey
Emmanuel Goldstein
0
The Browser Hacker's Handbook
Wade Alcorn
1
The Art of Intrusion. The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Kevin D. Mitnick
0
Network Security Foundations. Technology Fundamentals for IT Success
Matthew Strebe
0
Information Security. Principles and Practice
Mark Stamp
0
0
0
PDF
Mark Stamp
Information Security. Principles and Practice
0
0
PDF
Lynn Batten Margaret
Public Key Cryptography. Applications and Attacks
0
0
PDF
Б. В. Окунев
Virtualization of information object vulnerability testing container based on DeX technology and deep learning neural networks
0
0
PDF
Hacking Point of Sale. Payment Application Secrets, Threats, and Solutions
0
0
PDF
Reinhard Wobst
Cryptology Unlocked
0
0
PDF
Eduardo Fernandez-Buglioni
Security Patterns. Integrating Security and Systems Engineering
0
0
PDF
Kevin Beaver
Hacking For Dummies
5,0
1
PDF
Jeff Parker T.
Wireshark for Security Professionals. Using Wireshark and the Metasploit Framework
0
0
PDF
Innocent Code. A Security Wake-Up Call for Web Programmers
0
0
PDF
Igor Bernik
Cybercrime and Cyber Warfare
1,0
2
PDF
John Chirillo
Hack Attacks Testing. How to Conduct Your Own Security Audit
0
0
PDF
Eric Greenberg
Mission-Critical Security Planner. When Hackers Won't Take No for an Answer
0
0
PDF
Secrets and Lies. Digital Security in a Networked World
0
0
PDF
Roger Dube R.
Hardware-based Computer Security Techniques to Defeat Hackers. From Biometrics to Quantum Cryptography
0
0
PDF
Internet Security. Cryptographic Principles, Algorithms and Protocols
0
0
PDF
Man Rhee Young
Wireless Mobile Internet Security
0
0
PDF
Gary Jackson M.
Predicting Malicious Behavior. Tools and Techniques for Ensuring Global Security
0
0
PDF
Cryptography and Public Key Infrastructure on the Internet
0
0
PDF
Mike Chapple
CompTIA PenTest+ Study Guide. Exam PT0-001
0
0
PDF
Security Engineering. A Guide to Building Dependable Distributed Systems
0
0
PDF
Michael Ligh
Malware Analyst's Cookbook and DVD. Tools and Techniques for Fighting Malicious Code
0
0
PDF
Computer Security and Cryptography
0
0
PDF
Michael Gregg
CASP CompTIA Advanced Security Practitioner Study Guide. Exam CAS-002
0
0
PDF
Information Security Governance. A Practical Development and Implementation Approach
0
0
PDF
Eric Cole
Network Security Bible
0
0
PDF
Information Security. Principles and Practice
4,0
1
PDF
Kevin Beaver
Hacking For Dummies
0
0
PDF
Richard Low M.
Applied Cryptanalysis. Breaking Ciphers in the Real World
5,0
2
PDF
Markus Jakobsson
The Death of the Internet
0
0
PDF
Timothy Rooney
IP Address Management Principles and Practice
4,0
1
PDF
Кристофер Хэднеги
Phishing Dark Waters. The Offensive and Defensive Sides of Malicious Emails
5,0
1
PDF
Брюс Шнайер
Cryptography Engineering. Design Principles and Practical Applications
0
0
PDF
Joshua Davies
Implementing SSL / TLS Using Cryptography and PKI
0
0
PDF
Брюс Шнайер
Carry On. Sound Advice from Schneier on Security
0
0
PDF
Mike Chapple
CompTIA CSA+ Study Guide. Exam CS0-001
0
0
PDF
Emmanuel Goldstein
The Best of 2600, Collector's Edition. A Hacker Odyssey
5,0
1
PDF
Wade Alcorn
The Browser Hacker's Handbook
0
0
PDF
Kevin D. Mitnick
The Art of Intrusion. The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
0
0
PDF
Matthew Strebe
Network Security Foundations. Technology Fundamentals for IT Success
0
0
PDF
Mark Stamp
Information Security. Principles and Practice
1
2
3
4
5
...
15
Järgmine
Kasutame
küpsiseid
, et võimaldada veebilehe kiirem ja mugavam kasutamine.
Lisateave
Sain aru