vulnerability
31Spring Torrents , Иван Тургенев (1980)
Returning to Russia from a tour in Italy, twenty-three-year-old Dimitry Sanin breaks his journey in Frankfurt. There he encounters the beautiful Gemma Roselli, who works in her parents&apos… 1330 грн (только Украина)32Harry Potter and the Half-Blood Prince , J. K. Rowling (2013)
The war against Voldemort is not going well; even the Muggles have been affected. Dumbledore is absent from Hogwarts for long stretches of time, and the Order of the Phoenix has already suffered… 1096 грн (только Украина)33Structural Condition Assessment , Ratay (2012)
In Structural Condition Assessment, editor in chief Robert T. Ratay gathers together the leading people in the field to produce the first unified resource on all aspects of structural condition… 4965 грн (только Украина)34Money Mindset. Formulating a Wealth Strategy in the 21st Century , Jacob Gold
Harness the power of your money with a 21st century mindset The speed at which the world is evolving is compounding exponentially each day, leaving individual investors wondering how to appropriately… 1817.85 руб электронная книга35CompTIA CSA+ Study Guide. Exam CS0-001 , Mike Chapple
Prepare yourself for the newest CompTIA certification The CompTIA Cybersecurity Analyst+ (CSA+) Study Guide provides 100% coverage of all exam objectives for the new CSA+ certification. The CSA+… 3902.37 руб электронная книга36Hacking For Dummies , Kevin Beaver
Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated… 1950.53 руб электронная книга37Advanced Penetration Testing. Hacking the World's Most Secure Networks , Wil Allsopp
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to… 3251.98 руб электронная книга38iOS Hacker's Handbook , Charlie Miller
Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security… 2926.13 руб электронная книга39Cracking Drupal. A Drop in the Bucket , Greg Knaddison
The first book to reveal the vulnerabilities and security issues that exist in the sites that have been built with Drupal?and how to prevent them from continuing Drupal is an open source framework… 2601.58 руб электронная книга40Safeguarding Critical E-Documents. Implementing a Program for Securing Confidential Information Assets , Robert Smallwood F.
Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for… 4877.96 руб электронная книга