EtichettaShelf02Low
Comprende: Shelf02Low, Shelf02low, shelf02low
Opere etichettate
Etichettate più spesso | In proporzione alla biblioteca | Popolari di recente | Pubblicate di recente — Filtro: Nessuno (modifica)
- Cryptography Engineering: Design Principles and Practical Applications di Niels Ferguson (1 volte)
- Internal Investigations: A Basic Guide Anyone Can Use di Spencer Pickett (1 volte)
- Security Monitoring di Chris Fry (1 volte)
- Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast di Paco Hope (1 volte)
- Protect Your Digital Privacy! Survival Skills for the Information Age di Glee Harrah Cady (1 volte)
- Optical and Digital Techniques for Information Security (Advanced Sciences and Technologies for Security Applications) di Bahram Javidi (1 volte)
- Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals di Constantine Photopoulos (1 volte)
- The unofficial guide to ethical hacking di Ankit Fadia (1 volte)
- The Definitive Handbook of Business Continuity Management di Andrew Hiles (1 volte)
- Forensic Computing (Practitioner S.) di A J Sammes (1 volte)
- Network Service Investment Guide: Maximizing ROI in Uncertain Times (Networking Council) di Mark Gaynor (1 volte)
- Zen and the Art of Information Security di Ira Winkler (1 volte)
- Database Security (Acm Press Books) di Mariagrazia Fugini (1 volte)
- Firewall Architecture for the Enterprise di Norbert Pohlmann (1 volte)
- UNIX System Security Tools di Seth T. Ross (1 volte)
- Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management di Christopher Steel (1 volte)
- Network Security Essentials: Applications and Standards (3rd Edition) di William Stallings (1 volte)
- Secrets of Software Success: Management Insights from 100 Software Firms Around the World di Cyriac R. Roeding (1 volte)
- Stopping Spam di Alan Schwartz (1 volte)
- Operational Risk: Regulation, Analysis and Management di Carol Alexander (1 volte)
- Predictable Surprises: The Disasters You Should Have Seen Coming, and How to Prevent Them (Center for Public Leadership) di Max H. Bazerman (1 volte)
- XML Security di Blake Dournaee (1 volte)
- The Twofish Encryption Algorithm: A 128-Bit Block Cipher di Bruce Schneier (1 volte)
- Public Key Infrastructure Concepts, Design and Deployment di asutosh saxena (1 volte)
- Inside the Security Mind: Making the Tough Decisions di Kevin Day (1 volte)
Uso dell'etichetta
carlos_v_jugo (35)Etichettate di recente
Google Books Ngram Viewer
Dati da Books Ngram Viewer