BOOKS - NETWORK TECHNOLOGIES - Introduction to Network Security Theory and Practice
Introduction to Network Security Theory and Practice - Jie Wang, Zachary A. Kissel 2015 PDF | EPUB John Wiley & Sons BOOKS NETWORK TECHNOLOGIES
ECO~25 kg CO²

3 TON

Views
43111

Telegram
 
Introduction to Network Security Theory and Practice
Author: Jie Wang, Zachary A. Kissel
Year: 2015
Format: PDF | EPUB
File size: 28 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

An Elementary Introduction to the Theory of Probability by Gnedenko, B. V., Khinchin, A. Ya (2014) Paperback
A Critical Introduction to Queer Theory by Nikki Sullivan, NYU Press
Unlocking Luhmann: A Keyword Introduction to Systems Theory (BiUP General)
Introduction to Effective Field Theory Thinking Effectively about Hierarchies of Scale
A Walk Through CombinatoricsAn Introduction to Enumeration and Graph Theory, 4th Edition
Zero-trust - An Introduction (River Publishers Rapids Series in Digital Security and Forensics)
Competitive Strategies for the 21st Century: Theory, History, and Practice (Stanford Security Studies)
Introduction to Algebraic and Constructive Quantum Field Theory (Princeton Series in Physics, 56)
Introduction to Detonation Theory (Los Alamos Series in Basic and Applied Sciences)
Intelligent Network Management and Control Intelligent Security, Multi-criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio
Introduction to Nonlinear Optimization Theory, Algorithms, and Applications with Python and MATLAB, 2nd Edition
Game Audio Fundamentals: An Introduction to the Theory, Planning, and Practice of Soundscape Creation for Games
An Introduction to Optimal Control Theory: The Dynamic Programming Approach (Texts in Applied Mathematics, 76)
Applied Cryptography and Network Security: 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I (Lecture Notes in Computer Science, 13905)
Action-minimizing Methods in Hamiltonian Dynamics (MN-50): An Introduction to Aubry-Mather Theory (Mathematical Notes, 50)
An Introduction to the Mathematical Theory of Dynamic Materials (Advances in Mechanics and Mathematics) by Konstantin A. Lurie (2007-04-24)
Ethical Hacking Bible Cybersecurity, Cryptography, Network Security, Wireless Technology and Wireless Hacking with Kali Linux
Network programmability and Automation with python: The Ultimate Guide to Network Programmability with Python!Python Scripting for Network … with Python (Python Trailblazer|s Bible)
Network Programming with Go Learn to Code Secure and Reliable Network Services from Scratch
Network Programmability and Automation Skills for the Next-Generation Network Engineer 1st Edition
Mastering Network Forensics A practical approach to investigating and defending against network attacks
Mastering Network Forensics A practical approach to investigating and defending against network attacks
Python Scripting for Network Engineers Realizing Network Automation for Reliable Networks
Network Programming with Swift Tools and Techniques to Create iOS and OS X Apps that Network
Kafka Up and Running for Network DevOps Set Your Network Data in Motion
Kali Linux A Complete Guide for Beginners to Learn the Basics of Kali Linux and Wireless Network Hacking. Include, Cyber Security and Penetration Testing Tools
Network Programmability and Automation Skills for the Next-Generation Network Engineer, 2nd Edition (Final)
Network Automation with Nautobot: Adopt a network source of truth and a data-driven approach to networking
Ethical Hacking and Network Analysis with Wireshark Exploration of network packets for detecting exploits and malware
Ethical Hacking and Network Analysis with Wireshark Exploration of network packets for detecting exploits and malware
Network Programmability and Automation: Skills for the Next-Generation Network Engineer
Network Programmability and Automation: Skills for the Next-Generation Network Engineer
The Illustrated Network How TCP/IP Works in a Modern Network, Second Edition
Autonomous Driving Network: Network Architecture in the Era of Autonomy
CompTIA Network+ Certification Guide (Exam N10-008) Unleash your full potential as a Network Administrator
CompTIA Network+ Certification Guide (Exam N10-008) Unleash your full potential as a Network Administrator
Human Factor in Nuclear Security: Establishing and Optimizing Security Culture (Advanced Sciences and Technologies for Security Applications)
Piezoelectricity Volume Two An Introduction to the Theory and Applications of Electromechanical Phenomena in Crystals (Dover Books on Electrical Engineering) Revised edition
Ethical Hacking and Network Analysis with Wireshark: Exploration of network packets for detecting exploits and malware (English Edition)
Practical Go Building Scalable Network and Non-Network Applications