|
|
Результат поиска |
Поиск книг, содержащих: Social engineering
Книга | Страницы для поиска | Воройский Ф.С. — Информатика. Новый систематизированный толковый словарь | 107 | Gregg M., Kim D. — Inside Network Security Assessment: Guarding your IT Infrastructure | 2nd 3rd | Allard Kenneth — Business as War : Battling for Competitive Advantage | 153 | Davis H. — Absolute Beginner's Guide to Wi-Fi® Wireless Networking | | Graves K. — CEH: Official Certified Ethical Hacker Review Guide | 12, 19, 30 | Cowart R., Knittel B. — Special Edition Using Microsoft Windows XP Professional | | Gregg M. — CISA Exam Cram | 314 | Filiol E. — Computer Viruses: from theory to applications | 84, 87, 140, 144, 145, 293 | Paquet W, Saxe W. — Business Case for Network Security: Advocacy, Governance, and ROI | | Lane F.S. — The Naked Employee: How Technology Is Compromising Workplace Privacy | 41—43 | Hatch B., Lee J., Kurtz G. — Hacking linux exposed: linux security secrets & solutions | 129—137 | Maltoni D., Maio D., Jain A.K. — Handbook of fingerprint recognition | 294 | Воройский Ф.С. — Информатика. Энциклопедический словарь-справочник: введение в современные информационные и телекоммуникационные технологии в терминах и фактах | 80 | Orloff J. — How to Do Everything: Ubuntu | 94 | John Aycock — Computer Viruses and Malware | 6, 134—137, 143, 160, 170 |
|
|