Search alternatives:
"eyre" » "etre"

1
by El Khoury, Franjieh
Published 2013
CRC Press
Subjects: ...Iris (Eye) / http://id.loc.gov/authorities/subjects/sh85068076...

2
by Keeriyattil, Sreejith
Published 2019
Apress
Table of Contents: ... Composer and Third-Party Integration -- Chapter 5: Bird's-Eye View of a Zero Trust Network -- Chapter 6...

3
by Loewengart, Victoria
Published 2012
IT Governance Pub.
Table of Contents: ...; Chapter 1: Background; Chapter 2: Crimeware Products; "Zero Day" exploit toolkits; "Zeus"; "SpyEye...

4
by Doherty, Jim
Published 2006
Cisco Press
Table of Contents: ... -- Tip 4, keep your software updated -- Tip 5, lock out spyware and adware -- Tip 6, keep an eye on your...

5
by Canavan, Tom
Published 2011
Wiley Pub.
Table of Contents: ... Acquired; Operational Considerations; Looking at Your Site Through the Eyes of a Hacker; Steps to Gaining...

6
by Groom, Frank M., Groom, Kevin M., Jones, Stephan
Published 2017
CRC Press
Table of Contents: ... algorithm -- Browser security and cross-site scripting-- Banking security, Zeus, and SpyEye -- Web...

7
by Reid, Paul
Published 2003
Pearson
... verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid...

8
by Desman, Mark B.
Published 2002
Auerbach Publications
Table of Contents: ... for Affirmation -- chapter 20 Working with the Auditors for Fun and Pleasure -- chapter 21 Keep Your Eye...

9
by Fuchs, Christian
Published 2012
Routledge
Table of Contents: ... -- Disciplining the consumer: file sharers under the watchful eye of the music industry / David Arditi...

10
by Gupta, Bhasker
Published 2016
Apress, Distributed to the Book trade worldwide by Spring Science+Business Media New York

11
by Rhodes-Ousley, Mark
Published 2013
McGraw Hill Education
... of information protection; with an eye toward the evolving threat landscape. --...

13
by Seguis, Steve
Published 2009
Wiley Pub.
Table of Contents: ...pt. 1. Getting a Bird's-Eye View of PowerShell 2 -- Ch. 1. The Windows PowerShell Rap Sheet -- Ch...

14
by McFedries, Paul
Published 2009
Wiley
Table of Contents: ...Remove Red Eye from a PhotoAdd Names to Faces in Your Photos -- Map Your Photos -- E-mail a Photo...

15
by Long, Johnny
Published 2008
Syngress

16
by Bachrach, Daniel G., Rzeszut, Eric J.
Published 2014
Apress
Table of Contents: ... Engineering?; Keep Your Eye on the Ball; Hooking the Phish; Social Engineering via Social Networking...

17
by Bautista, Wilson
Published 2018
Packt Publishing
Table of Contents: ... + Capability = Active Defense -- Summary -- Chapter 9: Driving Cyber Intel -- The gap -- Another set of eyes...

18
by Qian, Yi
Published 2008
Elsevier/Morgan Kaufmann
... system from prying eyes and irreversible collapse...

19
by Collier, Mark D.
Published 2014
McGraw-Hill Education
... through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second...

20
by Hoda, Mynul
Published 2005
Cisco Press
... and analyze problems through the eyes of an experienced Cisco TAC or High-Touch Technical Support (HTTS...