Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: %22Vulnerability%22
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"384 - Communications; telecommunication"
Showing
1
-
8
of
8
Search:
'%22Vulnerability%22'
,
query time: 0.07s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScript
by
Glaser, J. D.
Published 2014
Auerbach Publications
Table of Contents:
“
... Authentication and SSL cURL; Chapter 21: Secure AJAX Shopping Cart; Chapter
22
: Common Facebook Canvas...
”
Call Number:
QA76.9.A25
Read Now
2
Computer networking : Internet protocols in action
by
Matthews, Jeanna
Published 2005
Wiley
Table of Contents:
“
... protocol -- Exercise 2.1. Under the hood of HTTP -- Exercise
2.2
. HTTP caching, authorization and cookies...
”
Call Number:
TK5105.5
Read Now
3
The Cyber Security Handbook - Prepare for, Respond to and Recover from Cyber Attacks
by
Calder, Alan
Published 2020
IT Governance Ltd
Table of Contents:
“
... analysis -- Chapter
22
: Step 5 -- Establish a continual improvement model...
”
Call Number:
QA76.9.A25
Read Now
4
(ISC)2 CISSP certified information systems security professional official study guide
by
Chapple, Mike
,
Stewart, James Michael
,
Gibson, Darril
Published 2021
John Wiley and Sons, Inc.
Table of Contents:
“
... -- Organizational Roles and Responsibilities 21 -- Security Control Frameworks
22
-- Due Diligence and Due Care 23...
”
Call Number:
QA76.3
Read Now
5
Smart and sustainable approaches for optimizing performance of wireless networks : real-time applications
Published 2022
John Wiley & Sons, Inc.
Table of Contents:
“
... -- 10.1.1 Security Challenge in Networks -- 10.1.2 Attacks
Vulnerability
in Complex Networks -- 10.2...
”
Call Number:
TK5105.5956
Read Now
6
Public safety networks from LTE to 5G
by
Yarali, Abdulrahman
Published 2020
John Wiley & Sons
Table of Contents:
“
... Involvement 17 --
2.2
Evolution to Broadband Systems 18 -- 2.2.1 Determining Factors 19 -- 2.2.2 Evolution...
”
Call Number:
TK6570.P8
Read Now
7
IPTV delivery networks : next generation architectures for live and video-on-demand services
Published 2018
John Wiley & Sons, Inc.
Table of Contents:
“
..., Pedro Comesaa, and Fernando Prez-Gonzlez -- 2.1 Introduction 25 --
2.2
Framework 29 -- 2.2.1 IPTV...
”
Call Number:
TK5105.887
Read Now
8
CompTIA network+ certification (N10-008) : the total course
Published 2022
Packt Publishing
“
.... In the fourth domain, we have network security at 19%. You will learn about threats,
vulnerabilities
, exploits...
”
Call Number:
TK7887
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 384 - Communications; telecommunication
Year of Publication
From:
To:
Classification
384 - Communications; telecommunication
331 - Labor economics
5
004 - Data processing & computer science
3
005 - Computer programming, programs & data
3
374 - Adult education
2
620 - Engineering & allied operations
2
more ...
621 - Applied physics
1
see all ...
less ...
Language
English
8
Collection
O'Reilly
8
Author
Ahad, Mohd Abdul
1
Ali, Syed Imran
1
Azad, Saiful
1
Calder, Alan
1
Chapple, Mike
1
Fati, Suliman Mohamed
1
more ...
Gibson, Darril
1
Glaser, J. D.
1
Matthews, Jeanna
1
Mehta, Deepa
1
Pathan, Al-Sakib Khan
1
Stewart, James Michael
1
Total Seminars LLC
1
Yarali, Abdulrahman
1
Zafar, Sherin
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22384+-+Communications%3B+telecommunication%22&lookfor=%2522Vulnerability%2522&type=AllFields
Send by Email
×
Loading...