Related Books
Language: en
Pages: 499
Pages: 499
Type: BOOK - Published: 2005 - Publisher: БХВ-Петербург
How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this outline of antivirus software, pa
Language: en
Pages: 610
Pages: 610
Type: BOOK - Published: 2007 - Publisher: БХВ-Петербург
Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide takes on the programming proble
Language: en
Pages: 322
Pages: 322
Type: BOOK - Published: 2006 - Publisher: БХВ-Петербург
Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they c
Language: en
Pages: 340
Pages: 340
Type: BOOK - Published: 2006 - Publisher: БХВ-Петербург
This comprehensive manual covers three areas in which system administrators must be proficient to successfully recover data: the structure and operating princip
Language: en
Pages: 584
Pages: 584
Type: BOOK - Published: 2003 - Publisher: БХВ-Петербург
Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide takes on the programming proble