COMPUTERS / Security / General
각 전자책을 클릭하여 상세정보를 조회하거나 제공 사이트를 클릭하여 전문을 조회하실 수 있습니다.
총 120건 중 21 - 40건 출력
-
21Book InfoHands-On Cryptography with Python: Leverage the Power of Python to Encrypt and Decrypt DataEBSCO e-Book Collection (NetLibrary 18th) - 20202018전문보기 (Full Text Access)EBSCO eBooks2018전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2018전문보기 (Full Text Access)ProQuest Ebook Central - Academic Complete International2018전문보기 (Full Text Access)
-
22Book InfoHands-On Cybersecurity with Blockchain: Implement DDoS Protection, PKI-based Identity, 2FA, and DNS Security Using BlockchainEBSCO eBooks2018전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2018전문보기 (Full Text Access)ProQuest Ebook Central - Academic Complete International2018전문보기 (Full Text Access)
-
23Book InfoHands-On Dark Web Analysis: Learn What Goes on in the Dark Web, and How to Work with ItEBSCO eBooks2018전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2018전문보기 (Full Text Access)
-
24Book InfoHands-On Enterprise Application Development with Python: Design Data-intensive Application with Python 3EBSCO eBooks2018전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2018전문보기 (Full Text Access)
-
25Book InfoHands-On Machine Learning for Cybersecurity: Safeguard Your System by Making Your Machines Intelligent Using the Python EcosystemEBSCO eBooks2018전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2018전문보기 (Full Text Access)
-
26Book InfoHands-On Penetration Testing on Windows: Unleash Kali Linux, PowerShell, and Windows Debugging Tools for Security Testing and AnalysisEBSCO eBooks2018전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2018전문보기 (Full Text Access)ProQuest Ebook Central - Academic Complete International2018전문보기 (Full Text Access)
-
27Book InfoHands-On Red Team Tactics: A Practical Guide to Mastering Red Team OperationsEBSCO eBooks2018전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2018전문보기 (Full Text Access)
-
28Book InfoHands-On Spring Security 5 for Reactive Applications: Learn Effective Ways to Secure Your Applications with Spring and Spring WebFluxEBSCO e-Book Collection (NetLibrary 17th) - 20192018전문보기 (Full Text Access)EBSCO eBooks2018전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2018전문보기 (Full Text Access)ProQuest Ebook Central - Academic Complete International2018전문보기 (Full Text Access)
-
29Book InfoHands-on Incident Response and Digital ForensicsO'Reilly Online Learning Platform: Academic/Public Library Edition2018전문보기 (Full Text Access)
-
30Book InfoHomeland Security and Critical Infrastructure ProtectionEBSCO e-Book Collection (NetLibrary 17th) - 20192018전문보기 (Full Text Access)EBSCO eBooks2018전문보기 (Full Text Access)
-
31Book InfoHacking Wireless Access Points: Cracking, Tracking, and Signal JackingScienceDirect eBooks - Freedom Collection 2017-20212017전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2016전문보기 (Full Text Access)
-
32Book InfoHacking mit MetasploitO'Reilly Online Learning Platform: Academic/Public Library Edition2017전문보기 (Full Text Access)
-
33Book InfoHardware IP Security and TrustSpringer e-Book Collection (2017)2017전문보기 (Full Text Access)
-
34Book InfoHardware Protection Through ObfuscationSpringer e-Book Collection (2017)2017전문보기 (Full Text Access)
-
35Book InfoHandbook of SCADA/Control Systems SecurityO'Reilly Online Learning Platform: Academic/Public Library Edition2016전문보기 (Full Text Access)
-
36Book InfoHandbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical SystemsO'Reilly Online Learning Platform: Academic/Public Library Edition2016전문보기 (Full Text Access)ScienceDirect eBooks - Freedom Collection 2016-20202016전문보기 (Full Text Access)
-
37Book InfoHiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic AnalysisO'Reilly Online Learning Platform: Academic/Public Library Edition2016전문보기 (Full Text Access)ScienceDirect eBooks - Freedom Collection 2016-20202016전문보기 (Full Text Access)
-
38Book InfoHow to Measure Anything in Cybersecurity RiskO'Reilly Online Learning Platform: Academic/Public Library Edition2016전문보기 (Full Text Access)ProQuest Ebook Central - Academic Complete International2016전문보기 (Full Text Access)
-
39Book InfoHCISPP Study GuideScienceDirect eBooks - Freedom Collection 2015-20192015전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2014전문보기 (Full Text Access)ProQuest Ebook Central - Academic Complete International2014전문보기 (Full Text Access)
-
40Book InfoHacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and TechniquesElsevier e-Book Freedom Collection (Ongoing)2015전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2015전문보기 (Full Text Access)ProQuest Ebook Central - Academic Complete International2015전문보기 (Full Text Access)ScienceDirect eBooks - Freedom Collection 2015-20192015전문보기 (Full Text Access)