LitRes
Suchen
Bitte geben Sie drei oder mehr Buchstaben für die Suche ein.
Anmelden
6
Wussten Sie schon...
Mitglied der LitRes-Familie werden und so die Umwelt schützen
Registrieren
Anmelden
Meine Bücher
Meine Bücher
Warenkorb
Listen
Über uns
Über uns & Kontakte
Genres
Neuheiten
Beliebt
Hörbücher
Bücher zum Lesen
Gutscheincode
Alle 345 Genres
Bücher
Wissen und Fähigkeiten
Computer
Informationssicherheit
Informationssicherheit
Unterkategorien
Eine Ebene höher
(Computer)
Neuheiten
Beliebt
E-Books und Audiobooks
E-Books und Audiobooks
E-Books
442
Hörbücher
104
in allen Sprachen
550
auf Englisch
52
auf Französisch
1
auf Italienisch
1
auf Portugiesisch
1
auf Russisch
494
auf Spanisch
1
Virtualization of information object vulnerability testing container based on DeX technology and deep learning neural networks
Б. В. Окунев
0
Security Patterns
Eduardo Fernandez-Buglioni
0
Internet Security
0
Applied Cryptanalysis
Richard Low M.
0
Information Security Governance
0
Hacking Point of Sale
0
Cryptography and Public Key Infrastructure on the Internet
0
Information Security
0
Computer Security and Cryptography
0
Security Engineering
0
Cryptology Unlocked
Reinhard Wobst
0
Innocent Code
0
Secrets and Lies
0
Hardware-based Computer Security Techniques to Defeat Hackers
Roger Dube R.
0
Hacking For Dummies
Kevin Beaver
1
CompTIA PenTest+ Study Guide. Exam PT0-001
Mike Chapple
0
Public Key Cryptography. Applications and Attacks
Lynn Batten Margaret
0
Information Security. Principles and Practice
Mark Stamp
0
Information Security. Principles and Practice
Mark Stamp
0
Data-Driven Security. Analysis, Visualization and Dashboards
Rudis Bob
0
IP Address Management Principles and Practice
Timothy Rooney
0
Public Key Cryptography. Applications and Attacks
Lynn Batten Margaret
4
The Death of the Internet
Markus Jakobsson
2
Cybercrime and Cyber Warfare
Igor Bernik
0
Wireless Mobile Internet Security
Man Rhee Young
0
The Art of Intrusion. The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Kevin D. Mitnick
0
Mission-Critical Security Planner. When Hackers Won't Take No for an Answer
Eric Greenberg
0
Hack Attacks Testing. How to Conduct Your Own Security Audit
John Chirillo
2
Unauthorised Access. Physical Penetration Testing For IT Security Teams
Wil Allsopp
0
Malicious Cryptography. Exposing Cryptovirology
Adam Young
0
The Oracle Hacker's Handbook. Hacking and Defending Oracle
David Litchfield
0
Schneier on Security
Брюс Шнайер
0
Network Security Bible
Eric Cole
0
Computer Forensics For Dummies
Reynaldo Anzaldua
1
Network Security Foundations. Technology Fundamentals for IT Success
Matthew Strebe
0
Phishing Dark Waters. The Offensive and Defensive Sides of Malicious Emails
Кристофер Хэднеги
1
The Browser Hacker's Handbook
Wade Alcorn
1
Carry On. Sound Advice from Schneier on Security
Брюс Шнайер
0
Predicting Malicious Behavior. Tools and Techniques for Ensuring Global Security
Gary Jackson M.
0
Unmasking the Social Engineer. The Human Element of Security
Кристофер Хэднеги
1
0
0
PDF
Б. В. Окунев
Virtualization of information object vulnerability testing container based on DeX technology and deep learning neural networks
0
0
PDF
Eduardo Fernandez-Buglioni
Security Patterns. Integrating Security and Systems Engineering
0
0
PDF
Internet Security. Cryptographic Principles, Algorithms and Protocols
0
0
PDF
Richard Low M.
Applied Cryptanalysis. Breaking Ciphers in the Real World
0
0
PDF
Information Security Governance. A Practical Development and Implementation Approach
0
0
PDF
Hacking Point of Sale. Payment Application Secrets, Threats, and Solutions
0
0
PDF
Cryptography and Public Key Infrastructure on the Internet
0
0
PDF
Information Security. Principles and Practice
0
0
PDF
Computer Security and Cryptography
0
0
PDF
Security Engineering. A Guide to Building Dependable Distributed Systems
0
0
PDF
Reinhard Wobst
Cryptology Unlocked
0
0
PDF
Innocent Code. A Security Wake-Up Call for Web Programmers
0
0
PDF
Secrets and Lies. Digital Security in a Networked World
0
0
PDF
Roger Dube R.
Hardware-based Computer Security Techniques to Defeat Hackers. From Biometrics to Quantum Cryptography
4,0
1
PDF
Kevin Beaver
Hacking For Dummies
0
0
PDF
Mike Chapple
CompTIA PenTest+ Study Guide. Exam PT0-001
0
0
PDF
Lynn Batten Margaret
Public Key Cryptography. Applications and Attacks
0
0
PDF
Mark Stamp
Information Security. Principles and Practice
0
0
PDF
Mark Stamp
Information Security. Principles and Practice
0
0
PDF
Rudis Bob
Data-Driven Security. Analysis, Visualization and Dashboards
0
0
PDF
Timothy Rooney
IP Address Management Principles and Practice
3,0
4
PDF
Lynn Batten Margaret
Public Key Cryptography. Applications and Attacks
5,0
2
PDF
Markus Jakobsson
The Death of the Internet
0
0
PDF
Igor Bernik
Cybercrime and Cyber Warfare
0
0
PDF
Man Rhee Young
Wireless Mobile Internet Security
0
0
PDF
Kevin D. Mitnick
The Art of Intrusion. The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
0
0
PDF
Eric Greenberg
Mission-Critical Security Planner. When Hackers Won't Take No for an Answer
1,0
2
PDF
John Chirillo
Hack Attacks Testing. How to Conduct Your Own Security Audit
0
0
PDF
Wil Allsopp
Unauthorised Access. Physical Penetration Testing For IT Security Teams
0
0
PDF
Adam Young
Malicious Cryptography. Exposing Cryptovirology
0
0
PDF
David Litchfield
The Oracle Hacker's Handbook. Hacking and Defending Oracle
0
0
PDF
Брюс Шнайер
Schneier on Security
0
0
PDF
Eric Cole
Network Security Bible
3,0
1
PDF
Reynaldo Anzaldua
Computer Forensics For Dummies
0
0
PDF
Matthew Strebe
Network Security Foundations. Technology Fundamentals for IT Success
4,0
1
PDF
Кристофер Хэднеги
Phishing Dark Waters. The Offensive and Defensive Sides of Malicious Emails
5,0
1
PDF
Wade Alcorn
The Browser Hacker's Handbook
0
0
PDF
Брюс Шнайер
Carry On. Sound Advice from Schneier on Security
0
0
PDF
Gary Jackson M.
Predicting Malicious Behavior. Tools and Techniques for Ensuring Global Security
5,0
1
PDF
Кристофер Хэднеги
Unmasking the Social Engineer. The Human Element of Security
1
2
3
4
5
...
14
Weiter
Wir verwenden
Cookies
, um Ihnen eine schnellere und komfortablere Nutzung der Website zu ermöglichen.
Mehr erfahren
Akzeptieren