Books
2 results foundTitle | Authors | Description | OpenBook ID | |
---|---|---|---|---|
![]() |
Forbidden Code | Jon Erickson | Dieses Buch beschreibt verschiedene Methoden, wie man in Computersysteme einbrechen kann. Es besteht hauptsächlich aus 3 Teilen: Programmierung (Buffer-Overflows, Format-Strings, ...), Netzwerke (Por… | OL15712977W |
![]() |
IT Auditing | Robert E. Davis, MBA, CISA, CICA | "IT Auditing: Assuring Information Assets Protection" provides a proven approach to assessing IT security frameworks, architectures, methods, and techniques. In terms of content, this publication con… | OL16684848W |