Cyber adversary characterization auditing the hacker mind /
Na minha lista:
| Autor Corporativo: | |
|---|---|
| Outros Autores: | |
| Formato: | Recurso Electrónico livro electrónico |
| Idioma: | inglês |
| Publicado em: |
Rockland, MA :
Syngress,
c2004.
|
| Assuntos: | |
| Acesso em linha: | An electronic book accessible through the World Wide Web; click to view |
| Tags: |
Sem tags, seja o primeiro a adicionar uma tag!
|
Registos relacionados: Cyber adversary characterization
- Cyber security and IT infrastructure protection /
- Invasion of privacy! big brother and the company hackers /
- Identity management concepts, technologies, and systems /
- Web commerce security design and development /
- Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
- Hacking the code ASP. NET web application security /