Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: ((conduct book) OR (conduct both))
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"005 - Computer programming, programs & data"
dewey-ones:"384 - Communications; telecommunication"
Search alternatives
:
conduct book »
conduct good
,
contact book
,
conduct about
Showing
1
-
8
of
8
Search:
'((conduct book) OR (conduct both))'
,
query time: 1.43s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Netcat power tools
by
Kanclirz, Jan
Published 2008
Syngress Pub.
“
.... This
book
offers a comprehensive look at its possibilities...
”
Call Number:
QA76.9.A25
Read Now
2
The Cyber Security Handbook - Prepare for, Respond to and Recover from Cyber Attacks
by
Calder, Alan
Published 2020
IT Governance Ltd
Table of Contents:
“
... Framework (CRF) -- 5.4 Structure of the
book
...
”
Call Number:
QA76.9.A25
Read Now
3
Hacking exposed wireless : wireless security secrets & solutions
by
Cache, Johnny
Published 2010
McGraw-Hill
“
... attacks. The
book
includes vital details on new, previously unpublished attacks alongside real-world...
”
Call Number:
TK5103.2
Read Now
4
Performance analysis for Java Web sites
by
Joines, Stacy
Published 2003
Addison-Wesley
“
... performance. This
book
is a timely guide for enterprise website developers and QA teams. The authors combine...
”
Call Number:
TK5105.888
Read Now
5
Hacking exposed : mobile security secrets & solutions
by
Bergman, Neil
Published 2013
McGraw-Hill
Call Number:
TK5105.59
Read Now
6
Cisco CCT routing and switching (100-490)
by
Wong, Ronnie
Published 2024
Packt Publishing
Call Number:
TK5105.5
Read Now
7
Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
by
Jaswal, Nipun
Published 2018
Packt Publishing
Table of Contents:
“
... virtual environment -- The fundamentals of Metasploit --
Conducting
a penetration test with Metasploit...
”
Call Number:
QA76.9.A25
Read Now
8
Intelligent mobile malware detection
by
Thomas, Tony
,
John, Teenu S.
,
Surendran, Roopak
,
Alazab, Mamoun
Published 2023
CRC Press
“
... graph and stochastic models. The
book
begins with an introduction to the Android operating system...
”
Call Number:
TK5105.59
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 005 - Computer programming, programs & data
Clear Filter
Classification: 384 - Communications; telecommunication
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
384 - Communications; telecommunication
331 - Labor economics
6
364 - Criminology
2
374 - Adult education
1
500 - Natural sciences & mathematics
1
more ...
620 - Engineering & allied operations
1
658 - General management
1
see all ...
less ...
Language
English
8
Collection
O'Reilly
8
Author
ACI Learning
1
Alazab, Mamoun
1
Baskin, Brian
1
Bergman, Neil
1
Bryan, Wes
1
Cache, Johnny
1
more ...
Calder, Alan
1
Hygh, Ken
1
Jaswal, Nipun
1
John, Teenu S.
1
Joines, Stacy
1
Kanclirz, Jan
1
Liu, Vincent
1
Rouse, Jason
1
Scambray, Joel
1
Stanfield, Mike
1
Surendran, Roopak
1
Thomas, Tony
1
Willenborg, Ruth
1
Wong, Ronnie
1
Wright, Joshua
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22005+-+Computer+programming%2C+programs+%26+data%22&filter%5B%5D=dewey-ones%3A%22384+-+Communications%3B+telecommunication%22&lookfor=%28%28conduct+book%29+OR+%28conduct+both%29%29&type=AllFields
Send by Email
×
Loading...