Hacking: The Art of Exploitation, 2nd Edition
Producent: No Starch Press
- Easy to read text
- It can be a gift option
- This product will be an excellent pick for you
- wiążący: paperback
- waga przedmiotu: 2.05 pounds
- marka: No Starch Press
- kod podmiotu: 1636, 1636, UM, URH, UT, UM, UTN, UTN, UDD, URD, A, DATE6000, DATE6350, HACK2000, 3667, COM060040, COM051000, COM053000, COM043050, 16360, URH, URH, UA
- producent: No Starch Press
- tytuł serii: NO STARCH PRESS
- gatunek muzyczny: COMPUTERS, Security, Network Security, COMPUTERS, Internet, Online Safety & Privacy, COMPUTERS, Programming, General, Network security, Online safety and behaviour, Privacy and data protection, Computer programming, software engineering
- Data publikacji: 2008-02-01T00:00:01Z
- numer wydania: 2
- nazwa przedmiotu: Hacking: The Art of Exploitation, 2nd Edition
- temat: COMPUTERS / Internet / Online Safety & Privacy, COMPUTERS / Programming / General, COMPUTERS / Security / General, COMPUTERS / Security / Network Security, COMPUTERS / Security / Networking, COMPUTERS / Security / Online Safety & Privacy, HC/Informatik, EDV/Datenkommunikation, Netzwerke, Informatik, EDV / Datenkommunikation, Netzwerke, Datenschutz, Datensicherheit / Netz, Hacker (EDV), COMPUTERS / Security / Network Security, COMPUTERS, Security, Network Security, COMPUTERS / Internet / Online Safety & Privacy, Internet, Online Safety & Privacy, COMPUTERS / Programming / General, Programming, General, Network security, Online safety and behaviour, Privacy and data protection, Computer programming / software engineering, Computer programming, software engineering, computers;security;computer;technology;hacking;networking;hackers;coding;code;privacy;algorithm;computer programming;clean code;algorithms;r;cybersecurity;tech;network;cyber security;cloud computing;computer networking;coding for beginners;penetration testing;computer networks;network security;computer books;cyber security books;hacking books;computer security;advanced r;programmer gifts;penetration test;computer programmer gifts;programming;computer science;cryptography;cyber;engineering, Computer fraud & hacking, Computer fraud & hacking, General Theory of Computing, Computer programming / software engineering, Computerkriminalität, Hacking, Computernetzwerke und maschinelle Kommunikation, Computerprogrammierung und Softwareentwicklung, Network security, Netzwerksicherheit, Online Sicherheit & Verhalten, Online safety and behaviour, Privacy and data protection, The Arts, ARTS ET BEAUX LIVRES, Datenkommunikation / Netze / Mailboxen, Computer hackers, Computer networks - Security measures, Computer security
- język: english, english, english
- strony: 488
- słowo kluczowe tematu: Aplikacje komputerowe, Computer Security, HACKERS, Hacking; programming; security; networking; computer security; cryptography; exploits, Kompleksowe zabezpieczenie, Komputer, Komputer / generał, Komputing: książka konsumentów ('Technical Trade'), Malware analysis;assembly language;computers;security;computer;technology;hacking;hackers;networking;code;privacy;algorithms;clean code;r;cyber security;cloud computing;penetration woring;netking;komputer tech; Network see. curity;computer Programming;cybersecurity;computer networks;Computer security;network;computer books;coding for początkujących, cyber security books;hacking books;advanced r;ComputerProgrammer Gifts;penetration test;programmer gifts;programming;cyber;cryptography, Non-Fiction, Profesjonalny, Stany Zjednoczone, Techniques, Technologia;coding;ComputerProgramming;computers;tech;physics;math;science books;math books;math science;blackjack;mathematics;games;artificial Intelligence;crime;crime books;English;basics;business;gamblbl. ing;innovation;computer science;hacking;diy;philosophy;programming;design;engineering;cars;scientific Method;cryptography;technical;college admission;coffee table books;coffee table book;economics;human body;school;invention;gaming;pover;pover;;Patriots". ;chemistry, analiza malwarwars; assembly language; komputer; technologia; hackers; networking; coding; privacy; algorithm; clean code; r; cyber security; cloud computing; Computer Network Testing; Computer Programming; tech; network secessing; Network secsecsecwork urity; komputer netto Works; cybersecurity; Computerbooks; Network; Computer security; coding dla początkujących; advanced r; hacking books; cyber security books; penetration Test; Prezentacja komputerowa; Programator Gifts; Programming; cryptografia, computers;security;computer;technology;hacking;networking;hackers;coding;code;privacy;algorithm;computer programming;clean code;algorithms;r;cybersecurity;tech;network;cyber security;cloud computing;computer networking;coding for beginners;penetration testing;computer networks;network security;computer books;cyber security books;hacking books;computer security;advanced r;programmer gifts;penetration test;computer programmer gifts;programming;computer science;cryptography;cyber;engineering, technologia;przyszłość;nauka;inżynieria;wiedza;rozwój
- grupa docelowa: General/trade
- Liczba przedmiotów: 1
- kolor: Black
- waga opakowania przedmiotu: 0.92 kilograms
- wydanie: 2