Search again

Found: 8  Titles

Order by :    Show:   Per Page
image
A guide to kernel exploitation attacking the core / Enrico Perla, Massimiliano Oldani.
Author
Perla, Enrico.
Published
Burlington, MA : Syngress, c2010.
Call Number
005.8,e-book

image
Managed code rootkits hooking into runtime environments / Erez Metula.
Author
Metula, Erez.
Published
Burlington, MA : Syngress, c2010.
Call Number
005.8,e-book

image
Seven deadliest Microsoft attacks Rob Kraus [and others].
Published
Amsterdam ; Boston : Syngress/Elsevier, c2010.
Call Number
005.8,e-book

image
Seven deadliest USB attacks Brian Anderson, Barbara Anderson ; technical editor, Andrew Rabie.
Author
Anderson, Brian
Published
Burlington, MA : Syngress, c2010.
Call Number
005.8,e-book

image
Seven deadliest wireless technologies attacks Brad Haines ; technical editor, Tim Kramer.
Author
Haines, Brad.
Published
Burlington, MA : Syngress/Elsevier, c2010.
Call Number
005.8,e-book

image
System assurance beyond detecting vulnerabilities / Nikolai Mansourov, Djenana Campara.
Author
Mansourov, Nikolai.
Published
San Francisco, Calif. : Morgan Kaufmann ; Oxford : Elsevier Science [distributor], 2010.
Call Number
005.8,e-book

image
The official CHFI exam 312-49 study guide for computer hacking forensics investigators.
Published
Burlington, MA : Syngress Pub., c2007.
Call Number
005.8,e-book

image
Wireless security models, threats, and solutions / Randall K. Nichols, Panos C. Lekkas.
Author
Nichols, Randall K.
Published
New York : McGraw-Hill, [2002].
Call Number
005.8,e-book

Search Tools: Get RSS Feed

เว็บไซต์นี้ มีการเก็บข้อมูลการใช้งานเว็บไซต์ (Cookies) เพื่อมอบบริการที่ดีที่สุดสำหรับคุณ โดยการเข้าใช้งานเว็บไซต์ ถือเป็นการยอมรับใน นโยบายคุกกี้ (Cookies Policy) | นโยบายส่วนบุคคล (Privacy Policy) ตกลง

Style Switcher
Theme Colors

Layout Styles