|
|
Результат поиска |
Поиск книг, содержащих: eavesdropping
Книга | Страницы для поиска | Gregg M., Kim D. — Inside Network Security Assessment: Guarding your IT Infrastructure | [See data collection stage of attacks] | Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide | | Bauer M.D. — Linux Server Security | | Bautts T., Dawson T., Purdy G.N. — Linux Network Administrator's Guide | | Bausch P. — Yahoo! Hacks | | Graves K. — CEH: Official Certified Ethical Hacker Review Guide | 163 | Cowart R., Knittel B. — Special Edition Using Microsoft Windows XP Professional | | Paquet W, Saxe W. — Business Case for Network Security: Advocacy, Governance, and ROI | 2nd 3rd 4th | Bauer F.L. — Decrypted Secrets: Methods and Maxims of Cryptology | 26, 208, 212, 280, 476, 480 | Radu Ch. — Implementing Electronic Card Payment Systems | 25—27, 296 | Kumar P., D'Ariano G.M., Hirota O. — Quantum communication, computing, and measurement 2 | 370 | Williams C.P., Clearwater S.H. — Explorations in quantum computing | 1, 161, 172, 173, 174, 175, 181 | Bruss D. (ed.), Leuchs G. (ed.) — Lectures on Quantum Information | 68, 272, 277 |
|
|