Cargando…
Seven Deadliest Wireless Technologies Attacks
How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how...
Autor principal: | Haines, Brad |
---|---|
Lenguaje: | eng |
Publicado: |
Elsevier
2010
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1315412 |
Ejemplares similares
-
Seven Deadliest Microsoft Attacks
por: Kraus, Rob, et al.
Publicado: (2010) -
Seven deadliest USB attacks
por: Anderson, Brian, et al.
Publicado: (2010) -
Seven Deadliest Network Attacks
por: Prowell, Stacy, et al.
Publicado: (2010) -
Seven Deadliest Web Application Attacks
por: Shema, Mike
Publicado: (2010) -
Seven Deadliest Social Network Attacks
por: Timm, Carl, et al.
Publicado: (2010)