02841 서울 성북구 안암로 145 고려대학교 도서관 학술정보큐레이션부 | E-MAIL libres@korea.ac.kr
Copyright © Korea University Library. All rights reserved.
COMPUTERS / Internet / Online Safety & Privacy
각 전자책을 클릭하여 상세정보를 조회하거나 제공 사이트를 클릭하여 전문을 조회하실 수 있습니다.
SORT BY
A-Z FILTER
총 30건 중 1 - 20건 출력
-
1Book InfoPractical Threat Detection Engineering: A Hands-on Guide to Planning, Developing, and Validating Detection CapabilitiesRoddie, Megan | Deyalsingh, Jason | Katz, Gary J.O'Reilly Online Learning Platform: Academic/Public Library Edition2023전문보기 (Full Text Access)
-
2Book InfoPractical Industrial Cybersecurity: ICS, Industry 4.0, and IIoTCharles J. Brooks | Philip A. Craig Jr.O'Reilly Online Learning Platform: Academic/Public Library Edition2022전문보기 (Full Text Access)
-
3Book InfoPrivacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile AppsDevjani Sen | Rukhsana AhmedEBSCO e-Book Collection (NetLibrary 19th) - 20212021전문보기 (Full Text Access)EBSCO eBooks2021전문보기 (Full Text Access)
-
4Book InfoPrivacy, Regulations, and Cybersecurity: The Essential Business GuideMoschovitis, ChrisO'Reilly Online Learning Platform: Academic/Public Library Edition2021전문보기 (Full Text Access)
-
5Book InfoPractical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devicesRohit Tamma | Oleg Skulkin | Heather Mahalik | Satish BommisettyEBSCO e-Book Collection (NetLibrary 19th) - 20212020전문보기 (Full Text Access)EBSCO eBooks2020전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2020전문보기 (Full Text Access)
-
6Book InfoPCI DSS: A Pocket GuideCalder, Alan | Williams, GeraintO'Reilly Online Learning Platform: Academic/Public Library Edition2019전문보기 (Full Text Access)
-
7Book InfoPraktische Einführung in Hardware Hacking: Sicherheitsanalyse und Penetration Testing für IoT-Geräte und Embedded DevicesSebastian Bicchi | Marcel MangelO'Reilly Online Learning Platform: Academic/Public Library Edition2019전문보기 (Full Text Access)
-
8Book InfoPractical Network Scanning: Capture Network Vulnerabilities Using Standard Tools Such As Nmap and NessusChauhan, Ajay SinghEBSCO e-Book Collection (NetLibrary 17th) - 20192018전문보기 (Full Text Access)EBSCO eBooks2018전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2018전문보기 (Full Text Access)ProQuest Ebook Central - Academic Complete International2018전문보기 (Full Text Access)
-
9Book InfoProtidžihádistický vigilantismus v kyberprostoruDrmola, JakubEBSCO eBooks2018전문보기 (Full Text Access)
-
10Book InfoParallel and Distributed Processing Techniques and ApplicationsArabnia, Hamid | Ishii, Hiroshi | Iwata, Makoto | Joe, Kazuki | Nishikawa, Hiroaki | Shouno, Hayaru | Tinetti, Fernando G. | Solo, Ashu M. G.EBSCO eBooks2017전문보기 (Full Text Access)
-
11Book InfoProtecting Your Children Online: What You Need to Know About Online Threats to Your ChildrenMcCabe, Kimberly A.EBSCO e-Book Collection (NetLibrary 16th) - 20182017전문보기 (Full Text Access)EBSCO eBooks2017전문보기 (Full Text Access)
-
12Book InfoProtecting Your Internet Identity: Are You Naked Online?Claypoole, Ted | Payton, TheresaEBSCO e-Book Collection (NetLibrary 16th) - 20182017전문보기 (Full Text Access)EBSCO eBooks2017전문보기 (Full Text Access)ProQuest Ebook Central - Academic Complete International2016전문보기 (Full Text Access)
-
13Book InfoPenetration Testing: A Hands-On Introduction to HackingWeidman, GeorgiaProQuest Ebook Central - Academic Complete International2014전문보기 (Full Text Access)
-
14Book InfoPenetration testing with backbox : an introductory guide to performing crucial penetration testing operations using backboxUygur, Stefan UmitEBSCO eBooks2014전문보기 (Full Text Access)ProQuest Ebook Central - Academic Complete International2014전문보기 (Full Text Access)
-
15Book InfoPenetration testing with the bash shell : make the most of the Bash shell and Kali Linux's command line-based security assessment toolsMakan, KeithEBSCO eBooks2014전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2014전문보기 (Full Text Access)ProQuest Ebook Central - Academic Complete International2014전문보기 (Full Text Access)
-
16Book InfoPrivacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your FamilyPayton, Theresa | Claypoole, TedEBSCO e-Book Collection (NetLibrary 15th) - 20172014전문보기 (Full Text Access)EBSCO eBooks2014전문보기 (Full Text Access)
-
17Book InfoPython ForensicsChet HosmerO'Reilly Online Learning Platform: Academic/Public Library Edition2014전문보기 (Full Text Access)ScienceDirect eBooks - Freedom Collection 2014-20182014전문보기 (Full Text Access)
-
18Book InfoPrivacy Solutions and Security Frameworks in Information ProtectionNemati, HamidEBSCO e-Book Collection (NetLibrary 12th) - 20142013전문보기 (Full Text Access)EBSCO eBooks2013전문보기 (Full Text Access)
-
19Book InfoPrivacy in America: Interdisciplinary PerspectivesProQuest Ebook Central - Academic Complete International2011전문보기 (Full Text Access)
-
20Book InfoProtectors of Privacy: Regulating Personal Data in the Global EconomyNewman, Abraham L.EBA Package: All english-language eBooks2008전문보기 (Full Text Access)EBSCO eBooks2008전문보기 (Full Text Access)
02841 서울 성북구 안암로 145 고려대학교 도서관 학술정보큐레이션부 | E-MAIL libres@korea.ac.kr
Copyright © Korea University Library. All rights reserved.
전자책 서비스 정보
도서관에서 제공하는 1,119,919종의 전자책 정보를 주제분야별로 분류하여 제공합니다.
전자책 리스트
전자책 서비스 정보
고려대학교 도서관 학술정보큐레이션부
02841 서울 성북구 안암로 145 고려대학교 도서관
COPYRIGHT ⓒ KOREA UNIVERSITY LIBRARY ALL RIGHTS RESERVED