Hacking exposed : malware and rootkits : security secrets & solutions /
Furkejuvvon:
| Váldodahkkit: | Elisan, Christopher C. (Dahkki), Davis, Michael, 1982- (Dahkki), Bodmer, Sean (Dahkki), LeMasters, Aaron (Dahkki) |
|---|---|
| Materiálatiipa: | Girji |
| Giella: | eaŋgalasgiella |
| Almmustuhtton: |
New York :
McGraw-Hill Education,
[2017]
|
| Preanttus: | 2nd ed. |
| Fáttát: | |
| Fáddágilkorat: |
Lasit fáddágilkoriid
Eai fáddágilkorat, Lasit vuosttaš fáddágilkora!
|
Geahča maid
Hacking exposed : malware and rootkits : security secrets & solutions /
Dahkki: Elisan, Christopher C., et al.
Almmustuhtton: (2017)
Dahkki: Elisan, Christopher C., et al.
Almmustuhtton: (2017)
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory /
Dahkki: Ligh, Michael Hale
Almmustuhtton: (2014)
Dahkki: Ligh, Michael Hale
Almmustuhtton: (2014)
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory /
Dahkki: Ligh, Michael Hale
Almmustuhtton: (2014)
Dahkki: Ligh, Michael Hale
Almmustuhtton: (2014)
Principles of information security /
Dahkki: Whitman, Michael E., 1964-
Almmustuhtton: (2016)
Dahkki: Whitman, Michael E., 1964-
Almmustuhtton: (2016)
Principles of information security /
Dahkki: Whitman, Michael E., 1964-
Almmustuhtton: (2016)
Dahkki: Whitman, Michael E., 1964-
Almmustuhtton: (2016)
Malware analyst's cookbook and dvd tools and techniques for fighting malicious code /
Dahkki: Ligh, Michael W.
Almmustuhtton: (2011)
Dahkki: Ligh, Michael W.
Almmustuhtton: (2011)
Malware analyst's cookbook and dvd tools and techniques for fighting malicious code /
Dahkki: Ligh, Michael W.
Almmustuhtton: (2011)
Dahkki: Ligh, Michael W.
Almmustuhtton: (2011)
Practical malware analysis the hands-on guide to dissecting malicious software /
Dahkki: Sikorski, Michael
Almmustuhtton: (2012)
Dahkki: Sikorski, Michael
Almmustuhtton: (2012)
Practical malware analysis the hands-on guide to dissecting malicious software /
Dahkki: Sikorski, Michael
Almmustuhtton: (2012)
Dahkki: Sikorski, Michael
Almmustuhtton: (2012)
Cuckoo malware analysis : analyze malware using Cuckoo Sandbox /
Dahkki: Oktavianto, Digit
Almmustuhtton: (2013)
Dahkki: Oktavianto, Digit
Almmustuhtton: (2013)
Cuckoo malware analysis : analyze malware using Cuckoo Sandbox /
Dahkki: Oktavianto, Digit
Almmustuhtton: (2013)
Dahkki: Oktavianto, Digit
Almmustuhtton: (2013)
The basics of information security : understanding the fundamentals of InfoSec in theory and practice /
Dahkki: Andress, Jason
Almmustuhtton: (2014)
Dahkki: Andress, Jason
Almmustuhtton: (2014)
The basics of information security : understanding the fundamentals of InfoSec in theory and practice /
Dahkki: Andress, Jason
Almmustuhtton: (2014)
Dahkki: Andress, Jason
Almmustuhtton: (2014)
Cyber security culture : counteracting cyber threats through organizational learning and training /
Dahkki: Trim, Peter R. J.
Almmustuhtton: (2013)
Dahkki: Trim, Peter R. J.
Almmustuhtton: (2013)
Cyber security culture : counteracting cyber threats through organizational learning and training /
Dahkki: Trim, Peter R. J.
Almmustuhtton: (2013)
Dahkki: Trim, Peter R. J.
Almmustuhtton: (2013)
Computer security : art and science /
Dahkki: Bishop, Matt (Matthew A.)
Almmustuhtton: (2019)
Dahkki: Bishop, Matt (Matthew A.)
Almmustuhtton: (2019)
Computer security : art and science /
Dahkki: Bishop, Matt (Matthew A.)
Almmustuhtton: (2019)
Dahkki: Bishop, Matt (Matthew A.)
Almmustuhtton: (2019)
Computer security : art and science /
Dahkki: Bishop, Matt (Matthew A.)
Almmustuhtton: (2019)
Dahkki: Bishop, Matt (Matthew A.)
Almmustuhtton: (2019)
Software piracy exposed
Dahkki: Honick, Ron
Almmustuhtton: (2005)
Dahkki: Honick, Ron
Almmustuhtton: (2005)
Software piracy exposed
Dahkki: Honick, Ron
Almmustuhtton: (2005)
Dahkki: Honick, Ron
Almmustuhtton: (2005)
Network security, firewalls, and VPNs /
Dahkki: Stewart, James Michael
Almmustuhtton: (2014)
Dahkki: Stewart, James Michael
Almmustuhtton: (2014)
Network security, firewalls, and VPNs /
Dahkki: Stewart, James Michael
Almmustuhtton: (2014)
Dahkki: Stewart, James Michael
Almmustuhtton: (2014)
Cyber security engineering : a practical approach for systems and software assurance /
Dahkki: Mead, Nancy R.
Almmustuhtton: (2016)
Dahkki: Mead, Nancy R.
Almmustuhtton: (2016)
Cyber security engineering : a practical approach for systems and software assurance /
Dahkki: Mead, Nancy R.
Almmustuhtton: (2016)
Dahkki: Mead, Nancy R.
Almmustuhtton: (2016)
A practical introduction to enterprise network and security management /
Dahkki: Shin, Bongsik
Almmustuhtton: (2017)
Dahkki: Shin, Bongsik
Almmustuhtton: (2017)
A practical introduction to enterprise network and security management /
Dahkki: Shin, Bongsik
Almmustuhtton: (2017)
Dahkki: Shin, Bongsik
Almmustuhtton: (2017)
An introduction to information security NIST special publication 800-12 (draft) revision 1
Dahkki: Nieles, Michael
Almmustuhtton: (2017)
Dahkki: Nieles, Michael
Almmustuhtton: (2017)
Information security practices : emerging threats and perspectives /
Dahkki: Traore, Issa
Almmustuhtton: (2016)
Dahkki: Traore, Issa
Almmustuhtton: (2016)
Information security practices : emerging threats and perspectives /
Dahkki: Traore, Issa
Almmustuhtton: (2016)
Dahkki: Traore, Issa
Almmustuhtton: (2016)
The basics of hacking and penetration testing ethical hacking and penetration testing made easy /
Dahkki: Engebretson, Pat (Patrick Henry), 1974-
Almmustuhtton: (2013)
Dahkki: Engebretson, Pat (Patrick Henry), 1974-
Almmustuhtton: (2013)
The basics of hacking and penetration testing ethical hacking and penetration testing made easy /
Dahkki: Engebretson, Pat (Patrick Henry), 1974-
Almmustuhtton: (2013)
Dahkki: Engebretson, Pat (Patrick Henry), 1974-
Almmustuhtton: (2013)
Hacking web apps detecting and preventing web application security problems /
Dahkki: Shema, Mike
Almmustuhtton: (2012)
Dahkki: Shema, Mike
Almmustuhtton: (2012)
Hacking web apps detecting and preventing web application security problems /
Dahkki: Shema, Mike
Almmustuhtton: (2012)
Dahkki: Shema, Mike
Almmustuhtton: (2012)
Cyber security. simply. make it happen. leveraging digitization through IT security
Almmustuhtton: (2017)
Almmustuhtton: (2017)
Hacking the art of exploitation /
Dahkki: Erickson, Jon, 1977-
Almmustuhtton: (2008)
Dahkki: Erickson, Jon, 1977-
Almmustuhtton: (2008)
Hacking the art of exploitation /
Dahkki: Erickson, Jon, 1977-
Almmustuhtton: (2003)
Dahkki: Erickson, Jon, 1977-
Almmustuhtton: (2003)
Geahča maid
-
Hacking exposed : malware and rootkits : security secrets & solutions /
Dahkki: Elisan, Christopher C., et al.
Almmustuhtton: (2017) -
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory /
Dahkki: Ligh, Michael Hale
Almmustuhtton: (2014) -
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory /
Dahkki: Ligh, Michael Hale
Almmustuhtton: (2014) -
Principles of information security /
Dahkki: Whitman, Michael E., 1964-
Almmustuhtton: (2016) -
Principles of information security /
Dahkki: Whitman, Michael E., 1964-
Almmustuhtton: (2016)