Search Results - "Computer security"

  1. 501

    Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools / by Makan, Keith

    Published 2014
    Subjects: “…Penetration testing (Computer security) Examinations.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  2. 502
  3. 503
  4. 504
  5. 505

    Information security applications : 7th International Workshop, WISA 2006 Jeju Island, Korea, August 28-30, 2006 revised selected papers /

    Published 2006
    Subjects: “…Computer security international cooperation congresses.…”
    Book
  6. 506

    Internet security and firewalls by Preetham, V. V.

    Published 2002
    Subjects: “…Firewalls (Computer security)…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 507

    Network interdiction and stochastic integer programming

    Published 2003
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  8. 508
  9. 509

    Intelligent watermarking techniques

    Published 2004
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  10. 510
  11. 511
  12. 512

    Writing security tools and exploits by Foster, James C.

    Published 2006
    Subjects: “…Computer security Handbooks, manuals, etc.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  13. 513

    Applied public key infrastructure 4th International Workshop : IWAP 2005 /

    Published 2005
    Subjects: “…Public key infrastructure (Computer security) Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  14. 514
  15. 515
  16. 516
  17. 517

    Distributed systems security issues, processes, and solutions /

    Published 2009
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  18. 518
  19. 519
  20. 520