English Deutsch Français 简体中文 繁體中文
Book123, Download eBooks for Free - Anytime! Submit your article
Technical Security/Hacking ebook



 
 
 
 

Technical Security/Hacking ebook


Results Technical Security/Hacking Ebook : 106 to 112 of 350
 
 


Security/Hacking 硬件工程师面试试题集 Security/Hacking 硬件工程师面试试题集
1、下面是一些基本的数字电路知识问题,请简要回答之。(1) 什么是Setup 和Hold 时间?答:Setup/Hold Time 用于测试芯片对输入信号和时钟信号之间的时间要求。建立时间(Setup Time)是指触发器的时钟信号上升沿到来以前,数据能够保持稳定不变的时间。输入数据 ...  
Tags : 试题   硬件工程师   面试   , Posted on 2010-06-01
 
Security/Hacking Der IT Security Manager Security/Hacking Der IT Security Manager
Gerhard Klett, "Der IT Security Manager" Vieweg+Teubner Verlag; 2008; ISBN: 3834804290; 252 pages; PDF; 1,3 MB Profitieren Sie von den Erfahrungen der Autoren. Mit diesem Buch erhalten Sie das aktuelle und zuverlässige Praxiswisse ...  
Tags : Manager   Security   , Posted on 2010-05-30
 
Security/Hacking Security Technology Security/Hacking Security Technology
Dominik Slezak, Tai-Hoon Kim, Wai-chi Fang, Kirk P. Arnett, "Security Technology" Springer; 2010; ISBN: 3642108466; 308 pages; PDF; 5,9 MB This volume constitutes the selected papers of the International Conference on Security Tech ...  
Tags : Technology   Security   , Posted on 2010-05-30
 
Security/Hacking Hospital and Healthcare Security, Fifth Edition Security/Hacking Hospital and Healthcare Security, Fifth Edition
Russell L. Colling, Tony W. York, "Hospital and Healthcare Security, Fifth Edition"Butterworth-Heinemann ; 2009-11-10 ; ISBN: 1856176134 ; 720 pages; PDF; 28 MBConcerns about healthcare security have proliferated in recent years, with ...  
Tags : Fifth   Hospital   Edition   Security   Healthcare   , Posted on 2010-05-30
 
Security/Hacking 上海贝尔TCP/IP培训资料 Security/Hacking 上海贝尔TCP/IP培训资料
在网上的两个计算机要通信,最终要利用它们的物理地址来联系。在局域网的技术中,使用最普遍的物理地址是MAC地址(以太网卡标识),它在以太网中唯一地标识了每个对象。MAC地址是一个48bit的整数。一般写成:U:V:W:X:Y:Z或U-V-W-X-Y-Z,U到Z是0~255的整数(常 ...  
Tags : 上海贝尔   资料   培训   , Posted on 2010-05-28
 
Security/Hacking Network Security Assessment: From Vulnerability to Patch {Repost} Security/Hacking Network Security Assessment: From Vulnerability to Patch {Repost}
Network Security Assessment: From Vulnerability to Patch Publisher: Syngress Publishing; ISBN: 1597491012; edition 2006; PDF; 417 pages; 10,5 mbThis book will take readers from the discovery of vulnerabilities and the creation of the ...  
Tags : Repost   Assessment   Patch   Network   Security   , Posted on 2010-05-28
 
Security/Hacking Hacking Windows Vista: ExtremeTech+Hacking Windows XP - Extreme Tech (Repost) Security/Hacking Hacking Windows Vista: ExtremeTech+Hacking Windows XP - Extreme Tech (Repost)
Hacking Windows Vista: ExtremeTech+Hacking Windows XP - Extreme Tech Publisher: Wiley; ISBN: 0470046872+0764577220; edition 2007-2004; CHM+PDF; 334-379 pages; 24 mbHacking Windows Vista: ExtremeTechVista is the most radical revamping ...  
Tags : Repost   Vista   Tech   Hacking   Windows   , Posted on 2010-05-28
 



Newest

Security/Hacking Хакеры
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)

Share With Friends



Like Book123?! Give us +1

Useful Links

Sign In | Not yet a member?