書名 | 作者 | 出版年 | 查看 | 回報錯誤連結 |
Google hacking for penetration testers |
Johnny Long, Bill Gardner, Justin Brown. |
2015 |
查看
|
回報問題連結 |
Practical deployment of Cisco Identity Services Engine (ISE):real-world examples of AAA deployments / |
Andy Richter, Jeremy Wood |
|
查看
|
回報問題連結 |
Handbook of system safety and security:cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems / |
Edward Griffor. |
2016 |
查看
|
回報問題連結 |
Snort:IDS and IPS toolkit / |
featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler ; foreword by Stephen Northcutt ; Toby Kohlenberg, technical editor. |
2007 |
查看
|
回報問題連結 |
Virtualization with Xen:including XenEnterprise, XenServer, and XenExpress / |
David E. Williams, technical editor ; Juan Garcia ; foreword by Simon Crosby. |
2007 |
查看
|
回報問題連結 |
The wireshark field guide:analyzing and troubleshooting network traffic / |
Robert Shimonski. |
2013 |
查看
|
回報問題連結 |
Network and system security |
John R. Vacca. |
2014 |
查看
|
回報問題連結 |
Social media security:leveraging social networking while mitigating risk / |
Michael Cross ; technical editor, Rob Shimonski. |
2014 |
查看
|
回報問題連結 |
Python forensics:a workbench for inventing and sharing digital forensic technology / |
Chet Hosmer. |
2014 |
查看
|
回報問題連結 |
Wireshark & Ethereal network protocol analyzer toolkit, Jay Beale's open source security series |
Angela Orebaugh ... [et al.] |
2007 |
查看
|
回報問題連結 |
How to cheat at securing Linux |
Mohan Krishnamurthy ... [et al.]. |
2008 |
查看
|
回報問題連結 |
How to cheat at administering Office communications server 2007 |
Anthony Piltzecker, technical editor [and lead author], Rand Morimoto; [contributing authors], Ron Barrett ... [et al.]. |
2008 |
查看
|
回報問題連結 |
A guide to kernel exploitation:attacking the core / |
Enrico Perla, Massimiliano Oldani. |
2010 |
查看
|
回報問題連結 |
Cisco router and switch forensics:investigating and analyzing malicious network activity / |
Dale Liu, lead author and technical editor ; James Burton ... [et al.]. |
2009 |
查看
|
回報問題連結 |
Eleventh hour CISSP:study guide / |
lead author, Eric Conrad ; contributing authors, Seth Misenar, Joshua Feldman ; technical editor, Kevin Riggins. |
2011 |
查看
|
回報問題連結 |
Seven deadliest network attacks |
Stacy Prowell, Rob Kraus, Mike Borkin. |
2010 |
查看
|
回報問題連結 |
|