Hacking Connected Cars : Tactics, Techniques, and Procedures
| Main Author: | Knight, Alissa (Author) |
|---|---|
| Format: | Book |
| Published: |
Canada :
John Wiley & Sons, Inc.
[2020]
|
| Subjects: |
Similar Items
Hands on Hacking
by: Hickey, Matthew, et al.
Published: (2020)
by: Hickey, Matthew, et al.
Published: (2020)
Penetration Testing for dummies
by: Shimonski, Robert
Published: (2020)
by: Shimonski, Robert
Published: (2020)
CompTIA Pentest+ Certification
by: Clarke, Glen E.
Published: (2021)
by: Clarke, Glen E.
Published: (2021)
White hat hacking
by: Smith, Jonathan
Published: (2015)
by: Smith, Jonathan
Published: (2015)
Hacking Multifactor Authentication
by: Grimes, Roger A.
Published: (2021)
by: Grimes, Roger A.
Published: (2021)
SELF-DRIVING CARS
by: Rathburn, Betsy
Published: (2021)
by: Rathburn, Betsy
Published: (2021)
GPEN : GIAC Certified Penetration Tester Exam Guide
by: Nutting, Raymond, et al.
Published: (2021)
by: Nutting, Raymond, et al.
Published: (2021)
Hack attacks revealed : a complete reference with custom security haking toolkit
by: Chirillo, John
Published: (2001)
by: Chirillo, John
Published: (2001)
Teknik wireless hacking dan cara pembendungannya
by: Efzy Zam
by: Efzy Zam
Hacking exposed web applications
by: Scambray, Joel
Published: (2002)
by: Scambray, Joel
Published: (2002)
The Hidden World of Hackers : Expressions
by: Wallace, Elise
Published: (2019)
by: Wallace, Elise
Published: (2019)
Hacking exposed fifth edition : network security secrets and solutions
by: McClure, Stuart
Published: (2005)
by: McClure, Stuart
Published: (2005)
Securing the cloud : cloud comuter security techniques and tactics
by: Winkler, Vic (J.R.)
Published: (2011)
by: Winkler, Vic (J.R.)
Published: (2011)
The personal cybersecurity bible
by: Ledford, Jerri L.
Published: (2006)
by: Ledford, Jerri L.
Published: (2006)
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2013)
by: Kostopoulos, George K.
Published: (2013)
The Complete idiot's guide to protecting yourself online
by: Gralla, Preston
Published: (1999)
by: Gralla, Preston
Published: (1999)
Securing E-Business applications and communications
by: Held, Jonathan S.
Published: (2001)
by: Held, Jonathan S.
Published: (2001)
Hacking for dummies
by: Beaver, Kevin
Published: (2022)
by: Beaver, Kevin
Published: (2022)
Hacking for dummies
by: Beaver, Kevin
Published: (2018)
by: Beaver, Kevin
Published: (2018)
Network security : a beginner's guide
by: Maiwald, Eric
Published: (2001)
by: Maiwald, Eric
Published: (2001)
Computer security fundamentals
by: Easttom, Chuck
Published: (2012)
by: Easttom, Chuck
Published: (2012)
Cybersecurity for dummies
by: Steinberg, Joseph
Published: (2022)
by: Steinberg, Joseph
Published: (2022)
Is it safe? : protecting your computer,your business and yourself online
by: Miller, Michael
Published: (2008)
by: Miller, Michael
Published: (2008)
Network security bible
by: Cole, Eric
Published: (2009)
by: Cole, Eric
Published: (2009)
24 deadly sins of software security : programming flaws and how to fix them
by: Howard, Michael 1965-
Published: (2010)
by: Howard, Michael 1965-
Published: (2010)
Elementary information security
by: Smith, Richard E.
Published: (2016)
by: Smith, Richard E.
Published: (2016)
Hacking exposed 6 : network security secrets & solutions
by: McClure, Stuart
Published: (2009)
by: McClure, Stuart
Published: (2009)
Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions
by: Davis, Michael
Published: (2010)
by: Davis, Michael
Published: (2010)
New solutions for cybersecurity
Published: (2017)
Published: (2017)
Professional penetration testing : creating and operating a formal hacking lab
by: Wilhelm, Thomas
Published: (2010)
by: Wilhelm, Thomas
Published: (2010)
IF IT'S SMART, IT'S VULNERABLE
by: Hypponen, Mikko
Published: (2022)
by: Hypponen, Mikko
Published: (2022)
The complete guide to internet security
by: Merkow, Mark S
Published: (2000)
by: Merkow, Mark S
Published: (2000)
Network security architectures
by: Convery, Sean
Published: (2004)
by: Convery, Sean
Published: (2004)
Fundamentals of information systems security
by: Kim, David
Published: (2012)
by: Kim, David
Published: (2012)
mCommerce security : A beginner's guide
by: Raina, Kapil
Published: (2002)
by: Raina, Kapil
Published: (2002)
Hacking the hackers : learn from the experts who take down take down hackers
by: Grimes, Roger A.
Published: (2017)
by: Grimes, Roger A.
Published: (2017)
Hacking exposed wireless : wireless security secrets and solutions
by: Wright, Joshua
Published: (2015)
by: Wright, Joshua
Published: (2015)
Digital defense : what you should know about protecting your company's assets
by: Parenty, Thomas J.
Published: (2003)
by: Parenty, Thomas J.
Published: (2003)
Gray hat hacking : the ethical hacker's handbook
by: Harris, Shon
Published: (2005)
by: Harris, Shon
Published: (2005)
Gray hay hacking : the ethical hacker's handbook
Published: (2011)
Published: (2011)
Similar Items
-
Hands on Hacking
by: Hickey, Matthew, et al.
Published: (2020) -
Penetration Testing for dummies
by: Shimonski, Robert
Published: (2020) -
CompTIA Pentest+ Certification
by: Clarke, Glen E.
Published: (2021) -
White hat hacking
by: Smith, Jonathan
Published: (2015) -
Hacking Multifactor Authentication
by: Grimes, Roger A.
Published: (2021)