CSDL SÁCH

Khoa Công Nghệ Thông Tin

Duyệt theo:
.jpg

Network programming with Perl

Tác giả: Lincoln D. Stein

The book quickly moves beyond the basics to focus on high-level, application programming concepts, tools, and techniques. Readers will find a review of basic networking concepts and Perl fundamentals, including Perls I/O functions, process model, and object-oriented extensions. In addition, the ...

  • Vị trí lưu trữ: 03 Quang Trung
  • Tổng sách: 5
  • Đang rỗi: 5
.jpg

Incident response & computer forensics : 3rd ed.

Tác giả: Jason T. Luttgens, Matthew Pepe, Kevin Mandia

Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of ...

  • Vị trí lưu trữ: 03 Quang Trung
  • Tổng sách: 14
  • Đang rỗi: 14
.jpg

Information technology project management : 8th ed.

Tác giả: Kathy Schwalbe

This book emphasizes the latest developments and skills to help you prepare for the Project Management Professional (PMP) or Certified Associate in Project Management (CAPM) exams. While this edition reflect content from the latest the PMBOK Guide, it goes well beyond the Guide to provide a ...

  • Vị trí lưu trữ: 209 Phan Thanh
  • Tổng sách: 5
  • Đang rỗi: 5
.jpg

Practical malware analysis : a hands-on guide to dissecting malicious software

Tác giả: Michael Sikorski, Andrew Honig

For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.

  • Vị trí lưu trữ: 03 Quang Trung
  • Tổng sách: 10
  • Đang rỗi: 10
.jpg

Introduction to information security : a strategic-based approach

Tác giả: Timothy Shimeall, Jonathan Spring

By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information. Information security is a rapidly ...

  • Vị trí lưu trữ: 03 Quang Trung
  • Tổng sách: 5
  • Đang rỗi: 5