Search alternatives:
"secularity" » "peculiarity", "secularism"
"regularity" » "regularly"

1
by Lockhart, Andrew
Published 2006
O'Reilly
Subjects: ...Computer security...

2
by Verma, Piyush
Published 2015
Packt Publishing
Table of Contents: ... and regular expressions -- Regular expressions -- Nailing the CTF challenge -- Summary -- Chapter 4 : Probing...

3
by Witte, Greg
Published 2012
McGraw-Hill
Table of Contents: ... -- Granularity -- Customization -- Performance -- Regular Expressions -- Chapter 8: Putting Security Automation...

4
by Babbin, Jacob
Published 2006
Syngress
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

5
by Vora, Zeal
Published 2017
Packt Publishing
Table of Contents: ... -- Best practices -- Application layer security -- Intrusion Prevention Systems -- Overview architecture...

6
by Wenz, Christian
Published 2022
Manning Publications
Subjects: ...Web sites / Security measures...

7
Published 2023
Pearson
Subjects: ...Computer networks / Security measures / Examinations / fast...

8
by Cross, Michael
Published 2007
Syngress Pub.
Table of Contents: ...: Securing Your Java Code; Chapter 8: Securing XML; Chapter 9: Building Safe ActiveX Internet Controls...

9
by Birrane, Edward
Published 2022
John Wiley & Sons, Inc.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

10
by Ahmad, David R. Mirza
Published 2002
Syngress
Table of Contents: ...</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br...

11
by Dulaney, Emmett A.
Published 2011
Wiley Pub.
Table of Contents: ...CompTIA Discount Coupon; CompTIA Security+ Deluxe Study Guide; Contents; Foreword; Introduction...

12
by Fleishman, Glenn
Published 2018
TidBITS Publishing, Inc.
... case, this book is for you. After over 15 years of writing regularly about Wi-Fi and answering reader...

13
by White, Bill, Andre, Didier, Baer, Lindsay, Bergh, Julie
Published 2023
IBM Redbooks
Subjects: ...Computer security / Management...

14 Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

15
by Warner, Tim
Published 2022
Microsoft Press
Subjects: ...Computer networks / Security measures / Examinations / Study guides...

16
by Jaswal, Nipun
Published 2018
Packt Publishing
Table of Contents: ... -- Securing SCADA -- Implementing secure SCADA -- Restricting networks -- Database exploitation -- SQL server...

17
Published 2023
CRC Press
Table of Contents: ... Using AI/ML Algorithms for Cyber Security -- 13 Using Machine Learning for Cyber Security: Overview...

18
by Hassan, Nihad A., Hijazi, Rami
Published 2018
Apress, Distributed to the Book trade worldwide by Springer
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

19
by Miller, Michael
Published 2009
Que
Subjects: ...Computer security / Management...

20
by Troncone, Paul, Albing, Carl
Published 2019
O'Reilly Media
Table of Contents: ...Part 1. Foundations. Command-line primer ; Bash primer ; Regular expressions primer ; Principles...