Kaydettiklerim
Sepet
Kitaplarım
Kayıt Olun
Virtualization of information object vulnerability testing container based on DeX technology and deep learning neural networks
Security Patterns
Internet Security
Applied Cryptanalysis
Information Security Governance
Hacking Point of Sale
Cryptography and Public Key Infrastructure on the Internet
Information Security
Computer Security and Cryptography
Security Engineering
Cryptology Unlocked
Innocent Code
Secrets and Lies
Hardware-based Computer Security Techniques to Defeat Hackers
Hacking For Dummies
CompTIA PenTest+ Study Guide. Exam PT0-001
Public Key Cryptography. Applications and Attacks
Information Security. Principles and Practice
Data-Driven Security. Analysis, Visualization and Dashboards
IP Address Management Principles and Practice
The Death of the Internet
Wireless Mobile Internet Security