English Deutsch Français 简体中文 繁體中文
Book123, Download eBooks for Free - Anytime! Submit your article
Technical Security/Hacking ebook



 
 
 
 

Technical Security/Hacking ebook


Results Technical Security/Hacking Ebook : 71 to 77 of 350
 
 


Security/Hacking Practical Unix and Internet Security (Repost) Security/Hacking Practical Unix and Internet Security (Repost)
Practical Unix and Internet Security Publisher: O'Reilly Media; ISBN: 1565921488; edition 1996; CHM; 1004 pages; 10,7 mbPractical Unix & Internet Security is on its second edition, and its maturity shows. To call this highly reada ...  
Tags : Repost   Security   Practical   Unix   Internet   , Posted on 2010-06-16
 
Security/Hacking 黑客编程技巧大全 Security/Hacking 黑客编程技巧大全
黑客编程技巧大全,讲述了黑客编程常用的手段,不妨学习学习  
Tags : 黑客   大全   技巧   , Posted on 2010-06-13
 
Security/Hacking IT Security Management: IT Securiteers - Setting up an IT Security Function Security/Hacking IT Security Management: IT Securiteers - Setting up an IT Security Function
Alberto Partida, Diego Andina, "IT Security Management: IT Securiteers - Setting up an IT Security Function " Springer; 2010; ISBN: 9048188814; 247 pages; PDF; 4,4 MB IT securiteers - The human and technical dimension working for t ...  
Tags : Setting   Security   Management   Function   Securiteers   , Posted on 2010-06-13
 
Security/Hacking 高并发高流量网站架构 Security/Hacking 高并发高流量网站架构
海量数据处理方法1.我们网站的信息系统,每天新增100W条用户数据,不知道如果解决才能查询更新更快,更合理.2.有一个条数据,同时有1W个用户查看(并发用户),我们的统计是每次+1,现在数据库更新时有问题了,排队更新,速度太慢.1,记住要安需所取,就是用户一次看多少 ...  
Tags : 架构   流量   , Posted on 2010-06-12
 
Security/Hacking 蓝牙核心技术 Security/Hacking 蓝牙核心技术
第1章蓝牙技术概述1.1蓝牙技术的发展1.2蓝牙技术的特点1.3蓝牙技术的协议标准1.4蓝牙与其他短距无线通信技术1.5蓝牙技术的应用1.6本书的内容组织1.7使用本书的几点建议第一部分蓝牙协议规范第2章蓝牙射频协议 ...  
Tags : 蓝牙   核心   技术   , Posted on 2010-06-10
 
Security/Hacking Konfliktmanagement für Sicherheitsprofis: Auswege aus der „Buhmann-Falle“ für IT-Sicherheitsbeauftragte, Datenschützer und Co Security/Hacking Konfliktmanagement für Sicherheitsprofis: Auswege aus der „Buhmann-Falle“ für IT-Sicherheitsbeauftragte, Datenschützer und Co
Sebastian Klipper, "Konfliktmanagement für Sicherheitsprofis: Auswege aus der „Buhmann-Falle“ für IT-Sicherheitsbeauftragte, Datenschützer und Co" Vieweg+Teubner Verlag; 2010; ISBN: 383481010X; 193 pages; PDF; 5 MB Ob Datensch ...  
Tags : Auswege   , Posted on 2010-06-09
 
Security/Hacking Forensic Art (Repost) Security/Hacking Forensic Art (Repost)
Forensic Art Publisher: Lucent Books; ISBN: 1420500694; edition 2007; PDF; 104 pages; 12,6 mbCrime solving is painstaking, but modern methods and technological advances have significantly changed the field of criminal investigation. C ...  
Tags : Repost   Forensic   , Posted on 2010-06-08
 



Newest

Security/Hacking Хакеры
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)

Share With Friends



Like Book123?! Give us +1

Useful Links

Sign In | Not yet a member?