5 livres(s)
Télécharger le livre :  The Extended Reality Blueprint
Ajouter à ma liste d'envies

The Extended Reality Blueprint


Annie Eaton


Follow a tried-and-tested approach to integrating augmented and virtual reality into your business The Extended Reality Blueprint focuses on design for non-gaming or gaming adjacent applications in extended reality (XR), including augmented and virtual reality. Author...

Parution : 2024-03-26
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
34,60
Télécharger le livre :  Unmasking the Social Engineer
Ajouter à ma liste d'envies

Unmasking the Social Engineer


Christopher Hadnagy


Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use...

Parution : 2014-01-27
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
33,76
Télécharger le livre :  The Oracle Hacker's Handbook
Ajouter à ma liste d'envies

The Oracle Hacker's Handbook


David Litchfield


David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique...

Parution : 2007-03-31
Format(s) : PDF
Éditeur : Wiley
J'achète
43,15
Télécharger le livre :  Malicious Cryptography
Ajouter à ma liste d'envies

Malicious Cryptography


Adam Young , Moti Yung


Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting...

Parution : 2004-07-30
Format(s) : PDF
Éditeur : Wiley
J'achète
43,25
Télécharger le livre :  Mission-Critical Security Planner
Ajouter à ma liste d'envies

Mission-Critical Security Planner


Eric Greenberg


Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes worksheets at every stage for creating a comprehensive security plan...

Parution : 2003-02-13
Format(s) : PDF
Éditeur : Wiley
J'achète
52,75

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés