Ítems similars: Unauthorised access
- Mobile access safety beyond BYOD /
- Cyber security and resiliency policy framework /
- Cybersecurity : managing systems, conducting testing, and investigating intrusions /
- Secure computer and network systems modeling, analysis and design /
- Virtual private networking a construction, operation and utilization guide /
- Network forensics /
Tema: Computer networks
- Cyber security and resiliency policy framework /
- Risk propagation assessment for network security application to airport communication network design /
- Encase computer forensics : the official ENCE : Encase certified examiner study guide /
- High performance heterogeneous computing
- VANETs : vehicular applications and inter-networking technologies /
- Media and the city : urbanism, technology and communication /
Tema: Local area networks (Computer networks)
- The all-new switch book the complete guide to LAN switching technology /
- Certification magazine for certified professionals of information technology.
- Internetwork
- Unauthorised access physical penetration testing for IT security teams /
- IT architect
- Network magazine the competitive edge in business technology.