Etiquetasecurity - other
Obras etiquetadas
Etiquetado más a menudo | Ponderado | Recientemente popular | Publicado recientemente — Filtrar: Ninguno (editar)
- Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves por Randall K. Nichols (2 veces)
- Secure Operations Technology por Andrew Ginter (1 veces)
- Trust in Computer Systems and the Cloud por Mike Bursell (1 veces)
- Artificial Intelligence and Machine Learning for Business for Non-Engineers (Technology for Non-Engineers) por Stephan S. Jones (1 veces)
- Zero to AI: A non-technical, hype-free guide to prospering in the AI era por Nicolo Valigi (1 veces)
- A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using por Roger A. Grimes (1 veces)
- Artificial Intelligence Basics: A Non-Technical Introduction por Tom Taulli (1 veces)
- Artificial Intelligence Safety and Security (Chapman & Hall/CRC Artificial Intelligence and Robotics Series) por Roman V. Yampolskiy (1 veces)
- Cyber Security Engineering: A Practical Approach for Systems and Software Assurance (SEI Series in Software Engineering) por Nancy R. Mead (1 veces)
- Password (Object Lessons) por Martin Paul Eve (1 veces)
- Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails por Christopher Hadnagy (1 veces)
- Security for Web Developers: Using JavaScript, HTML, and CSS por John Paul Mueller (1 veces)
- Think Like a Programmer: An Introduction to Creative Problem Solving por V. Anton Spraul (1 veces)
- Low Tech Hacking: Street Smarts for Security Professionals por Jack Wiles (1 veces)
- Securing the Cloud: Cloud Computer Security Techniques and Tactics por Vic (J.R.) Winkler (1 veces)
- Cyber Attacks: Protecting National Infrastructure por Edward Amoroso (1 veces)
- Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance por Tim Mather (1 veces)
- Geekonomics: The Real Cost of Insecure Software por David Rice (1 veces)
- No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing por Johnny Long (1 veces)
- Security and Usability: Designing Secure Systems that People Can Use por Lorrie Cranor (1 veces)
- Out of the Inner Circle: A Hacker's Guide to Computer Security por Bill Landreth (1 veces)
- The Adolescence of P-1 por Thomas J. Ryan (1 veces)
- The Art of Deception: Controlling the Human Element of Security por Kevin D. Mitnick (1 veces)
Usan esta etiqueta
Ninguno
Etiquetados recientemente
Google Books Ngram Viewer
Datos de Books Ngram Viewer