Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Livro
|
Digital Watermarking and SteganographyIngemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton KalkerSan Diego: Elsevier Science 2007Texto completo disponível |
|
2 |
Material Type: Livro
|
Cyber Attacks: Protecting National InfrastructureAmoroso, EdwardOxford: Elsevier Science 2010Texto completo disponível |
|
3 |
Material Type: Livro
|
Cloud Computing: Theory and PracticeMarinescu, Dan CSan Diego: Elsevier Science & Technology 2017Texto completo disponível |
|
4 |
Material Type: Livro
|
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control SystemsKnapp, Eric D ; Langill, Joel ThomasSan Diego: Elsevier Science 2014Texto completo disponível |
|
5 |
Material Type: Livro
|
Buffer Overflow Attacks: Detect, Exploit, PreventDeckard, JasonSan Diego: Elsevier Science 2005Texto completo disponível |
|
6 |
Material Type: Livro
|
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows RegistryCarvey, HarlanSan Diego: Elsevier Science 2011Texto completo disponível |
|
7 |
Material Type: Livro
|
Securing the Cloud: Cloud Computer Security Techniques and TacticsWinkler, Vic (J. R. )San Diego: Elsevier Science & Technology Books 2011Texto completo disponível |
|
8 |
Material Type: Livro
|
Digital WatermarkingIngemar Cox, Matthew Miller, Jeffrey Bloom, Mathew MillerSan Diego: Elsevier Science 2001Texto completo disponível |
|
9 |
Material Type: Livro
|
Multimedia security technologies for digital rights managementZeng, Wenjun ; Yu, Heather ; Lin, Ching-YungAcademic Press 2007Texto completo disponível |
|
10 |
Material Type: Livro
|
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability ResearchMaynor, David ; Mookhey, K. KRockland, MA: Elsevier Science 2011Texto completo disponível |