IF IT'S SMART, IT'S VULNERABLE
| Main Author: | Hypponen, Mikko (Author) |
|---|---|
| Format: | Book |
| Published: |
Hoboken, New Jersey :
John Wiley & Sons, Inc.
[2022]
|
| Subjects: |
Similar Items
The personal cybersecurity bible
by: Ledford, Jerri L.
Published: (2006)
by: Ledford, Jerri L.
Published: (2006)
The Complete idiot's guide to protecting yourself online
by: Gralla, Preston
Published: (1999)
by: Gralla, Preston
Published: (1999)
The complete guide to internet security
by: Merkow, Mark S
Published: (2000)
by: Merkow, Mark S
Published: (2000)
How personal & internet security work
by: Gralla, Preston
Published: (2006)
by: Gralla, Preston
Published: (2006)
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2013)
by: Kostopoulos, George K.
Published: (2013)
Cybersecurity for dummies
by: Steinberg, Joseph
Published: (2022)
by: Steinberg, Joseph
Published: (2022)
Network security : a beginner's guide
by: Maiwald, Eric
Published: (2001)
by: Maiwald, Eric
Published: (2001)
Hack attacks revealed : a complete reference with custom security haking toolkit
by: Chirillo, John
Published: (2001)
by: Chirillo, John
Published: (2001)
Teknik wireless hacking dan cara pembendungannya
by: Efzy Zam
by: Efzy Zam
Computer security fundamentals
by: Easttom, Chuck
Published: (2012)
by: Easttom, Chuck
Published: (2012)
Hacking Multifactor Authentication
by: Grimes, Roger A.
Published: (2021)
by: Grimes, Roger A.
Published: (2021)
Is it safe? : protecting your computer,your business and yourself online
by: Miller, Michael
Published: (2008)
by: Miller, Michael
Published: (2008)
Network security bible
by: Cole, Eric
Published: (2009)
by: Cole, Eric
Published: (2009)
24 deadly sins of software security : programming flaws and how to fix them
by: Howard, Michael 1965-
Published: (2010)
by: Howard, Michael 1965-
Published: (2010)
Elementary information security
by: Smith, Richard E.
Published: (2016)
by: Smith, Richard E.
Published: (2016)
Own your space : keep yourself and your stuff safe online
by: McCarthy, Linda
Published: (2007)
by: McCarthy, Linda
Published: (2007)
Network security architectures
by: Convery, Sean
Published: (2004)
by: Convery, Sean
Published: (2004)
Fundamentals of information systems security
by: Kim, David
Published: (2012)
by: Kim, David
Published: (2012)
Hacking exposed web applications
by: Scambray, Joel
Published: (2002)
by: Scambray, Joel
Published: (2002)
The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of big brother and big data
by: Mitnick, Kevin
Published: (2017)
by: Mitnick, Kevin
Published: (2017)
Securing the cloud : cloud comuter security techniques and tactics
by: Winkler, Vic (J.R.)
Published: (2011)
by: Winkler, Vic (J.R.)
Published: (2011)
The complete reference : Information security
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Security risk management : building an information security risk management program from the ground up
by: Wheeler, Evan
Published: (2011)
by: Wheeler, Evan
Published: (2011)
Principles of information security
by: Whitman, Michael E.
Published: (2003)
by: Whitman, Michael E.
Published: (2003)
Exploiting online game : cheating massively distributed systems
by: Hoglund, Greg
Published: (2008)
by: Hoglund, Greg
Published: (2008)
New solutions for cybersecurity
Published: (2017)
Published: (2017)
Cybersecurity : politics, governance and conflict in cyberspace
by: Van Puyvelde, Damien
Published: (2018)
by: Van Puyvelde, Damien
Published: (2018)
INTERNET CONTENT REGULATION : CONTEMPORARY LEGAL AND REGULATORY ISSUES IN THE CHANGING DIGITAL LANDSCAPE
by: Mahyuddin Daud
Published: (2021)
by: Mahyuddin Daud
Published: (2021)
Fundamentals of network security
by: Maiwald, Eric
Published: (2004)
by: Maiwald, Eric
Published: (2004)
Wireless security : models, threats and solutions
by: Nichols, Randall K.
Published: (2002)
by: Nichols, Randall K.
Published: (2002)
The cybersecurity playbook : how every leader and employee can contribute to a culture of security
by: Cerra, Allison
by: Cerra, Allison
Security in fixed and wireless networks : an introduction to securing data communications
by: Schafer, Gunter
Published: (2003)
by: Schafer, Gunter
Published: (2003)
Hacking exposed fifth edition : network security secrets and solutions
by: McClure, Stuart
Published: (2005)
by: McClure, Stuart
Published: (2005)
CompTIA Pentest+ Certification
by: Clarke, Glen E.
Published: (2021)
by: Clarke, Glen E.
Published: (2021)
Hands on Hacking
by: Hickey, Matthew, et al.
Published: (2020)
by: Hickey, Matthew, et al.
Published: (2020)
Click here to kill everybody : security and survival in a hyper-connected world
by: Schneier, Bruce
Published: (2018)
by: Schneier, Bruce
Published: (2018)
Cyberphobia : identity, trust, security and the internet
by: Lucas, Edward
Published: (2015)
by: Lucas, Edward
Published: (2015)
CLOUD SECURITY : A GENERAL GUIDE TO SECURED COMPUTING
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
Auditing cloud computing : a security and privacy guide
Published: (2011)
Published: (2011)
Security strategy : from requirements to reality
by: Stackpole, Bill
Published: (2011)
by: Stackpole, Bill
Published: (2011)
Similar Items
-
The personal cybersecurity bible
by: Ledford, Jerri L.
Published: (2006) -
The Complete idiot's guide to protecting yourself online
by: Gralla, Preston
Published: (1999) -
The complete guide to internet security
by: Merkow, Mark S
Published: (2000) -
How personal & internet security work
by: Gralla, Preston
Published: (2006) -
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2013)