LitRes
Search
Please enter three or more letters to search
Log in
6
Do you know that...
Joining LitRes, you care about the environment
Sign up
Log in
My books
My books
Cart
Lists
About us
About & Contacts
Genres
New releases
Popular
Audiobooks
Books to read
Coupon
All 345 genres
Books
Knowledge and skills
Computers
Information security
Information security
Subgenres
One level up
(Computers)
New releases
Popular
E-books
E-books and audiobooks
E-books
442
Audiobooks
104
in all languages
442
in English
52
in French
1
in Italian
1
in Portuguese
1
in Russian
386
in Spanish
1
Virtualization of information object vulnerability testing container based on DeX technology and deep learning neural networks
Б. В. Окунев
0
Kali Linux. Тестирование на проникновение и безопасность (pdf + epub)
Шива Парасрам
5
Public Key Cryptography. Applications and Attacks
Lynn Batten Margaret
0
Information Security. Principles and Practice
Mark Stamp
0
Security Patterns
Eduardo Fernandez-Buglioni
0
Internet Security
0
Applied Cryptanalysis
Richard Low M.
0
Information Security Governance
0
Hacking Point of Sale
0
Cryptography and Public Key Infrastructure on the Internet
0
Information Security
0
Computer Security and Cryptography
0
Security Engineering
0
Cryptology Unlocked
Reinhard Wobst
0
Innocent Code
0
Secrets and Lies
0
Hardware-based Computer Security Techniques to Defeat Hackers
Roger Dube R.
0
Hacking For Dummies
Kevin Beaver
1
CompTIA PenTest+ Study Guide. Exam PT0-001
Mike Chapple
0
Information Security. Principles and Practice
Mark Stamp
0
Data-Driven Security. Analysis, Visualization and Dashboards
Rudis Bob
0
IP Address Management Principles and Practice
Timothy Rooney
0
Public Key Cryptography. Applications and Attacks
Lynn Batten Margaret
4
The Death of the Internet
Markus Jakobsson
2
Cybercrime and Cyber Warfare
Igor Bernik
0
Wireless Mobile Internet Security
Man Rhee Young
0
The Art of Intrusion. The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Kevin D. Mitnick
0
Mission-Critical Security Planner. When Hackers Won't Take No for an Answer
Eric Greenberg
0
Hack Attacks Testing. How to Conduct Your Own Security Audit
John Chirillo
2
Unauthorised Access. Physical Penetration Testing For IT Security Teams
Wil Allsopp
0
Malicious Cryptography. Exposing Cryptovirology
Adam Young
0
The Oracle Hacker's Handbook. Hacking and Defending Oracle
David Litchfield
0
Schneier on Security
Bruce Schneier
0
Network Security Bible
Eric Cole
0
Computer Forensics For Dummies
Reynaldo Anzaldua
1
Network Security Foundations. Technology Fundamentals for IT Success
Matthew Strebe
0
Phishing Dark Waters. The Offensive and Defensive Sides of Malicious Emails
Christopher Hadnagy
1
The Browser Hacker's Handbook
Wade Alcorn
1
Predicting Malicious Behavior. Tools and Techniques for Ensuring Global Security
Gary Jackson M.
0
Carry On. Sound Advice from Schneier on Security
Bruce Schneier
0
0
0
PDF
Б. В. Окунев
Virtualization of information object vulnerability testing container based on DeX technology and deep learning neural networks
4,8
5
PDF
Шива Парасрам
Kali Linux. Тестирование на проникновение и безопасность (pdf + epub)
0
0
PDF
Lynn Batten Margaret
Public Key Cryptography. Applications and Attacks
0
0
PDF
Mark Stamp
Information Security. Principles and Practice
0
0
PDF
Eduardo Fernandez-Buglioni
Security Patterns. Integrating Security and Systems Engineering
0
0
PDF
Internet Security. Cryptographic Principles, Algorithms and Protocols
0
0
PDF
Richard Low M.
Applied Cryptanalysis. Breaking Ciphers in the Real World
0
0
PDF
Information Security Governance. A Practical Development and Implementation Approach
0
0
PDF
Hacking Point of Sale. Payment Application Secrets, Threats, and Solutions
0
0
PDF
Cryptography and Public Key Infrastructure on the Internet
0
0
PDF
Information Security. Principles and Practice
0
0
PDF
Computer Security and Cryptography
0
0
PDF
Security Engineering. A Guide to Building Dependable Distributed Systems
0
0
PDF
Reinhard Wobst
Cryptology Unlocked
0
0
PDF
Innocent Code. A Security Wake-Up Call for Web Programmers
0
0
PDF
Secrets and Lies. Digital Security in a Networked World
0
0
PDF
Roger Dube R.
Hardware-based Computer Security Techniques to Defeat Hackers. From Biometrics to Quantum Cryptography
4,0
1
PDF
Kevin Beaver
Hacking For Dummies
0
0
PDF
Mike Chapple
CompTIA PenTest+ Study Guide. Exam PT0-001
0
0
PDF
Mark Stamp
Information Security. Principles and Practice
0
0
PDF
Rudis Bob
Data-Driven Security. Analysis, Visualization and Dashboards
0
0
PDF
Timothy Rooney
IP Address Management Principles and Practice
3,0
4
PDF
Lynn Batten Margaret
Public Key Cryptography. Applications and Attacks
5,0
2
PDF
Markus Jakobsson
The Death of the Internet
0
0
PDF
Igor Bernik
Cybercrime and Cyber Warfare
0
0
PDF
Man Rhee Young
Wireless Mobile Internet Security
0
0
PDF
Kevin D. Mitnick
The Art of Intrusion. The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
0
0
PDF
Eric Greenberg
Mission-Critical Security Planner. When Hackers Won't Take No for an Answer
1,0
2
PDF
John Chirillo
Hack Attacks Testing. How to Conduct Your Own Security Audit
0
0
PDF
Wil Allsopp
Unauthorised Access. Physical Penetration Testing For IT Security Teams
0
0
PDF
Adam Young
Malicious Cryptography. Exposing Cryptovirology
0
0
PDF
David Litchfield
The Oracle Hacker's Handbook. Hacking and Defending Oracle
0
0
PDF
Bruce Schneier
Schneier on Security
0
0
PDF
Eric Cole
Network Security Bible
3,0
1
PDF
Reynaldo Anzaldua
Computer Forensics For Dummies
0
0
PDF
Matthew Strebe
Network Security Foundations. Technology Fundamentals for IT Success
4,0
1
PDF
Christopher Hadnagy
Phishing Dark Waters. The Offensive and Defensive Sides of Malicious Emails
5,0
1
PDF
Wade Alcorn
The Browser Hacker's Handbook
0
0
PDF
Gary Jackson M.
Predicting Malicious Behavior. Tools and Techniques for Ensuring Global Security
0
0
PDF
Bruce Schneier
Carry On. Sound Advice from Schneier on Security
1
2
3
4
5
...
12
Next
We use
cookies
to make your experience on our website faster and more convenient.
Read more
I agree