Teknologi hacking & pencegahan
| Main Author: | Wan Ahmad |
|---|---|
| Format: | Book |
| Published: |
K.L. :
SynergyMedia (K.L.) ,
2014
|
| Subjects: |
Similar Items
Instrusion alert : an ethical hacking guide to intrusion detection
by: Fadia, Ankit
Published: (2007)
by: Fadia, Ankit
Published: (2007)
Hacking the xbox : an introduction to reverse engineering
by: Huang, Andrew
Published: (2003)
by: Huang, Andrew
Published: (2003)
Koleksi lengkap Software Hacking & teknik penghalang
by: Nik Fauzi
by: Nik Fauzi
Intrusion detection & prevention
Published: (2005)
Published: (2005)
Implementing secured converged wide-area networks (ISCW 642-825) lab portfolio
by: Kotfila, David
Published: (2008)
by: Kotfila, David
Published: (2008)
Windows NT internet and internet development : volume 3
by: Hettihewa, Sanjaya
Published: (1997)
by: Hettihewa, Sanjaya
Published: (1997)
Network programming
by: Sachin Kumar
Published: (2011)
by: Sachin Kumar
Published: (2011)
UNIX network programming
by: Stevens, W. Richard
Published: (1998)
by: Stevens, W. Richard
Published: (1998)
Ubuntu hacks
by: Oxer, Jonathan
Published: (2006)
by: Oxer, Jonathan
Published: (2006)
Network security 1 and 2 companion guide
by: Rufi, Antoon W.
Published: (2007)
by: Rufi, Antoon W.
Published: (2007)
Network security technologies and solutions
by: Bhaiji, Fahim Hussain Yusuf
Published: (2008)
by: Bhaiji, Fahim Hussain Yusuf
Published: (2008)
Network security : the complete reference
by: Bragg, Roberta
Published: (2005)
by: Bragg, Roberta
Published: (2005)
End-to-end network security : defense-in-depth
by: Santos, Omar
Published: (2008)
by: Santos, Omar
Published: (2008)
The encyclopedia of high-tech crime and crime-fighting
by: Newton, Michael
Published: (2005)
by: Newton, Michael
Published: (2005)
Data Communication and Computer Networks
by: Agrawal, Rajneesh
Published: (2007)
by: Agrawal, Rajneesh
Published: (2007)
Cryptography & network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Build your own security lab : a field guide for network testing
by: Gregg, Micheal (Micheal C.)
Published: (2008)
by: Gregg, Micheal (Micheal C.)
Published: (2008)
CNE study guide IntranetWare/NetWare 4.11
by: Clarke, David James
Published: (1997)
by: Clarke, David James
Published: (1997)
Object oriented programming through Java
by: Krishna, P Radha
Published: (2007)
by: Krishna, P Radha
Published: (2007)
Cryptography and network security
by: Bagad, V.S
by: Bagad, V.S
CNE study guide intranetWare/NetWare 4.11
by: Clarke, David James
Published: (1997)
by: Clarke, David James
Published: (1997)
Designing and supporting computer networks : CCNA discovery learning guide, part I : concepts
by: Stewart, Kenneth D.
Published: (2008)
by: Stewart, Kenneth D.
Published: (2008)
Computers and computation : a beginners's guide
by: Dastidar, D. Ghost
Published: (1997)
by: Dastidar, D. Ghost
Published: (1997)
Hacker 5 : Menyingkap Rahsia Windows
Published: (2005)
Published: (2005)
Ubuntu : powerful hacks and customizations
by: Krawetz, Neal
Published: (2010)
by: Krawetz, Neal
Published: (2010)
Computer network technology
by: Bagad, Vilas S
Published: (2007)
by: Bagad, Vilas S
Published: (2007)
Teknik terkini membina laman Joomla!
by: Ollie
by: Ollie
Computer networking : the complete guide
by: Murray, Benjamin
Published: (2022)
by: Murray, Benjamin
Published: (2022)
Using intranet ware : special edition
by: Zacker, Craig
Published: (1997)
by: Zacker, Craig
Published: (1997)
Menguasai internet
by: Ahmad Zaharim Abdul Aziz,dr
Published: (1999)
by: Ahmad Zaharim Abdul Aziz,dr
Published: (1999)
Pengenalan jaringan komputer
by: Meor Muhammad Muazzim
by: Meor Muhammad Muazzim
Computer troubleshooting
by: MacRae,Kyle
Published: (2004)
by: MacRae,Kyle
Published: (2004)
Exploring computers : computer fundamentals and internet basics.
by: Khurana's, Rohit
Published: (2002)
by: Khurana's, Rohit
Published: (2002)
IT auditing : using controls to protect information assets
by: Davis, Chris
Published: (2007)
by: Davis, Chris
Published: (2007)
Hacker 5 : pakar keselamatan rangkaian - norton internet security
Published: (2005)
Published: (2005)
Teknik menggempur virus
by: Muhammad Haiqal Mohd Jamaluddin
Published: (2009)
by: Muhammad Haiqal Mohd Jamaluddin
Published: (2009)
Primavera project planner version 3.0 : a practical guide in plain English
by: Ng Kok Heong
by: Ng Kok Heong
Takecharge computing for teens & parents
by: Dixon, Pam
Published: (1996)
by: Dixon, Pam
Published: (1996)
Designing an IAM Framework with oracle identity and access management suite
by: Scheidel, Jeff
Published: (2010)
by: Scheidel, Jeff
Published: (2010)
Upgrading & fixing networks for dummies
by: Camarda, Bill
Published: (1998)
by: Camarda, Bill
Published: (1998)
Similar Items
-
Instrusion alert : an ethical hacking guide to intrusion detection
by: Fadia, Ankit
Published: (2007) -
Hacking the xbox : an introduction to reverse engineering
by: Huang, Andrew
Published: (2003) -
Koleksi lengkap Software Hacking & teknik penghalang
by: Nik Fauzi -
Intrusion detection & prevention
Published: (2005) -
Implementing secured converged wide-area networks (ISCW 642-825) lab portfolio
by: Kotfila, David
Published: (2008)