COMPUTERS / Security / Viruses & Malware
각 전자책을 클릭하여 상세정보를 조회하거나 제공 사이트를 클릭하여 전문을 조회하실 수 있습니다.
총 85건 중 21 - 40건 출력
-
21Book InfoAdversarial Tradecraft in Cybersecurity: Offense Versus Defense in Real-time Computer ConflictEBSCO eBooks2021전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2021전문보기 (Full Text Access)
-
22Book InfoCybersecurity Lessons From CoVID-19EBSCO e-Book Collection (NetLibrary 20th) - 20222021전문보기 (Full Text Access)EBSCO eBooks2021전문보기 (Full Text Access)
-
23Book InfoLa sicurezza dei dati e delle reti aziendali: Tecniche e best practice per evitare intrusioni indesiderateO'Reilly Online Learning Platform: Academic/Public Library Edition2021전문보기 (Full Text Access)
-
24Book InfoMalware Analysis Techniques: Tricks for the Triage of Adversarial SoftwareEBSCO eBooks2021전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2021전문보기 (Full Text Access)
-
25Book InfoPractical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK™ Framework and open source toolsO'Reilly Online Learning Platform: Academic/Public Library Edition2021전문보기 (Full Text Access)
-
26Book InfoPrivilege Escalation Techniques: Learn the Art of Exploiting Windows and Linux SystemsEBSCO eBooks2021전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2021전문보기 (Full Text Access)
-
27Book InfoThe Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacksO'Reilly Online Learning Platform: Academic/Public Library Edition2021전문보기 (Full Text Access)
-
28Book InfoCompTIA security+ practice tests SY0-501: practice tests in 4 different formats and 6 cheat sheets to help you pass the compTIA ecurity+ examEBSCO e-Book Collection (NetLibrary 19th) - 20212020전문보기 (Full Text Access)EBSCO eBooks2020전문보기 (Full Text Access)
-
29Book InfoCyber Intelligence-Driven Risk: How to Build and Use Cyber Intelligence for Business Risk DecisionsProQuest Ebook Central - Academic Complete International2020전문보기 (Full Text Access)
-
30Book InfoCyber Warfare - Truth, Tactics, and Strategies: Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfareEBSCO e-Book Collection (NetLibrary 19th) - 20212020전문보기 (Full Text Access)EBSCO eBooks2020전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2020전문보기 (Full Text Access)
-
31Book InfoCybersecurity Attacks - Red Team Strategies: A practical guide to building a penetration testing program having homefield advantageEBSCO e-Book Collection (NetLibrary 19th) - 20212020전문보기 (Full Text Access)EBSCO eBooks2020전문보기 (Full Text Access)
-
32Book InfoCybersecurity Fundamentals: A Real-World PerspectiveProQuest Ebook Central - Academic Complete International2020전문보기 (Full Text Access)
-
33Book InfoCybersecurity Threats, Malware Trends, and Strategies: Mitigate Exploits, Malware, Phishing, and Other Social Engineering AttacksEBSCO e-Book Collection (NetLibrary 19th) - 20212020전문보기 (Full Text Access)EBSCO eBooks2020전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2020전문보기 (Full Text Access)
-
34Book InfoCybersecurity law, standards and regulationsProQuest Ebook Central - Academic Complete International2020전문보기 (Full Text Access)
-
35Book InfoDigital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threatsEBSCO e-Book Collection (NetLibrary 19th) - 20212020전문보기 (Full Text Access)EBSCO eBooks2020전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2020전문보기 (Full Text Access)
-
36Book InfoHands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple TeamingO'Reilly Online Learning Platform: Academic/Public Library Edition2020전문보기 (Full Text Access)ProQuest Ebook Central - Academic Complete International2020전문보기 (Full Text Access)
-
37Book InfoHands-On Web Penetration Testing with Metasploit: The Subtle Art of Using Metasploit 5.0 for Web Application ExploitationEBSCO eBooks2020전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2020전문보기 (Full Text Access)
-
38Book InfoMetasploit 5.0 for Beginners: Perform penetration testing to secure your IT environment against threats and vulnerabilitiesEBSCO e-Book Collection (NetLibrary 19th) - 20212020전문보기 (Full Text Access)EBSCO eBooks2020전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2020전문보기 (Full Text Access)
-
39Book InfoPractical Vulnerability Management: A Strategic Approach to Managing Cyber RiskO'Reilly Online Learning Platform: Academic/Public Library Edition2020전문보기 (Full Text Access)
-
40Book InfoBinary Analysis Cookbook: Actionable Recipes for Disassembling and Analyzing Binaries for Security RisksEBSCO e-Book Collection (NetLibrary 19th) - 20212019전문보기 (Full Text Access)EBSCO eBooks2019전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2019전문보기 (Full Text Access)