Computer security

VMware NSX Cookbook: Over 70 recipes to master the network...

Tony Sangha and Bayu Wibowo


Practical Mobile Forensics: Forensically investigate and...

Heather Mahalik, Satish Bommisetty, et al.


Instant Spring Security Starter

Piotr Jagielski and Jakub Nabrdalik


RFID Security

USA) Thornton New Hampshire Blackthorn Systems Frank (Owner and USA) Lanthem Chris (Security/Network Engineer for NSight Technologies


Computer Terrorism

Ph D Douglas E Campbell


Mastering Microsoft Forefront UAG 2010 Customization

Erez Ben-Ari and Rainier Amara


Python: Penetration Testing for Developers

Terry Ip, Andrew Mabbitt, et al.


Passwort Liste/Buch - digitaler Nachlass/Erbe -...

Uwe H Sultz and Renate Sultz


Information Security Objectives and Practices - An...

Qingxiong Ma and John (University of Namur Belgium) Pearson


Coding for Penetration Testers: Building Better Tools

GPEN) Andress CISM ISSAP Jason (CISSP and CISSP) Linn CCNP Security GPEN Ryan (OSCE

We use cookies and similar methods to recognize visitors and remember their preferences. We also use them to help detect unauthorized access or activity that violate our terms of service, as well as to analyze site traffic and performance for our own site improvement efforts. To learn more about these methods, including how to disable them view our Cookie Policy.