Hacking point of sale : payment application secrets, threats, and solutions /
Saved in:
Main Author: | Gomzin, Slava |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Indianapolis, IN :
John Wiley and Sons,
[2014]
|
Subjects: | |
Online Access: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Hacking the art of exploitation /
by: Erickson, Jon, 1977-
Published: (2003)
by: Erickson, Jon, 1977-
Published: (2003)
Hacking the art of exploitation /
by: Erickson, Jon, 1977-
Published: (2008)
by: Erickson, Jon, 1977-
Published: (2008)
Hacking for dummies
by: Beaver, Kevin
Published: (2013)
by: Beaver, Kevin
Published: (2013)
Code hacking a developer's guide to network security /
by: Conway, Richard, 1974-
Published: (2004)
by: Conway, Richard, 1974-
Published: (2004)
InfoSec career hacking sell your skillz, not your soul /
by: Bayles, Aaron W.
Published: (2005)
by: Bayles, Aaron W.
Published: (2005)
Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management countermeasures /
by: Contos, Brian T.
Published: (2006)
by: Contos, Brian T.
Published: (2006)
Web application defender's cookbook battling hackers and protecting users /
by: Barnett, Ryan C.
Published: (2013)
by: Barnett, Ryan C.
Published: (2013)
The basics of web hacking tools and techniques to attack the Web /
by: Pauli, Joshua J.
Published: (2013)
by: Pauli, Joshua J.
Published: (2013)
Biohackers the politics of open science /
by: Delfanti, Alessandro
Published: (2013)
by: Delfanti, Alessandro
Published: (2013)
Defense against the black arts : how hackers do what they do and how to protect against it /
by: Varsalone, Jesse, et al.
Published: (2017)
by: Varsalone, Jesse, et al.
Published: (2017)
Hacking the code ASP. NET web application security /
by: Burnett, Mark (Mark M.)
Published: (2004)
by: Burnett, Mark (Mark M.)
Published: (2004)
Insider threat protecting the enterprise from sabotage, spying, and theft /
by: Cole, Eric
Published: (2006)
by: Cole, Eric
Published: (2006)
Professional penetration testing creating and learning in a hacking lab /
by: Wilhelm, Thomas
Published: (2013)
by: Wilhelm, Thomas
Published: (2013)
Stealing the network how to own a continent /
Published: (2004)
Published: (2004)
Penetration tester's open source toolkit
Published: (2006)
Published: (2006)
Hacking with Kali : practical penetration testing techniques /
by: Broad, James
Published: (2014)
by: Broad, James
Published: (2014)
Hack proofing your network
Published: (2002)
Published: (2002)
The CEH prep guide the comprehensive guide to certified ethical hacking /
by: Krutz, Ronald L., 1938-
Published: (2007)
by: Krutz, Ronald L., 1938-
Published: (2007)
Dear hacker letters to the editor of 2600 /
by: Goldstein, Emmanuel J.
Published: (2010)
by: Goldstein, Emmanuel J.
Published: (2010)
The basics of hacking and penetration testing ethical hacking and penetration testing made easy /
by: Engebretson, Pat (Patrick Henry), 1974-
Published: (2013)
by: Engebretson, Pat (Patrick Henry), 1974-
Published: (2013)
Hack proofing Windows 2000
by: Todd, Chad
Published: (2001)
by: Todd, Chad
Published: (2001)
Hack proofing ColdFusion
by: Meyer, Greg
Published: (2002)
by: Meyer, Greg
Published: (2002)
Hack proofing your wireless network
by: Owens, Les
Published: (2001)
by: Owens, Les
Published: (2001)
Social engineering the art of human hacking /
by: Hadnagy, Christopher
Published: (2011)
by: Hadnagy, Christopher
Published: (2011)
Threat modeling : designing for security /
by: Shostack, Adam
Published: (2014)
by: Shostack, Adam
Published: (2014)
Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting /
Published: (2003)
Published: (2003)
Penetration testing : a hands-on introduction to hacking /
by: Weidman, Georgia
Published: (2014)
by: Weidman, Georgia
Published: (2014)
Hacking web apps detecting and preventing web application security problems /
by: Shema, Mike
Published: (2012)
by: Shema, Mike
Published: (2012)
Hacking exposed : malware and rootkits : security secrets & solutions /
by: Elisan, Christopher C., et al.
Published: (2017)
by: Elisan, Christopher C., et al.
Published: (2017)
Computer viruses and other malicious software a threat to the Internet economy.
Published: (2009)
Published: (2009)
Game console hacking have fun while voiding your warranty /
by: Grand, Joe
Published: (2004)
by: Grand, Joe
Published: (2004)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
by: Mularien, Peter
Published: (2010)
by: Mularien, Peter
Published: (2010)
Identity management concepts, technologies, and systems /
by: Bertino, Elisa
Published: (2011)
by: Bertino, Elisa
Published: (2011)
Computer security fundamentals /
by: Easttom, Chuck
Published: (2006)
by: Easttom, Chuck
Published: (2006)
Cyber adversary characterization auditing the hacker mind /
Published: (2004)
Published: (2004)
Buffer overflow attacks detect, exploit, prevent /
by: Foster, James C.
Published: (2005)
by: Foster, James C.
Published: (2005)
Mastering network security
by: Brenton, Chris
Published: (2003)
by: Brenton, Chris
Published: (2003)
Cybersecurity operations handbook
by: Rittinghouse, John W.
Published: (2003)
by: Rittinghouse, John W.
Published: (2003)
Invasion of privacy! big brother and the company hackers /
by: Weber, Michael
Published: (2004)
by: Weber, Michael
Published: (2004)
The misuse of information systems the impact of security countermeasures /
by: D'Arcy, John P., 1975-
Published: (2007)
by: D'Arcy, John P., 1975-
Published: (2007)
Similar Items
-
Hacking the art of exploitation /
by: Erickson, Jon, 1977-
Published: (2003) -
Hacking the art of exploitation /
by: Erickson, Jon, 1977-
Published: (2008) -
Hacking for dummies
by: Beaver, Kevin
Published: (2013) -
Code hacking a developer's guide to network security /
by: Conway, Richard, 1974-
Published: (2004) -
InfoSec career hacking sell your skillz, not your soul /
by: Bayles, Aaron W.
Published: (2005)