Peruzi
Books
BOOKS
| Security
(
65
books)
Peruzi
Books
Here you can find and download your favourite books instantly.
Language
All
English
Russian
German
Spanish
Chinese
French
Italian
Portuguese
Ukrainian
Turkish
Polish
Greek
Hungarian
Romanian
Dutch
Arabic
Japanese
Bengali
Urdu
Kazakh
Persian
Lithuanian
Croatian
Serbian
Latin
Czech
Danish
Indonesian
Korean
Tamil
Norwegian
Bulgarian
Belarusian
Hebrew
Swedish
Swahili
Sort by
Random
Year
Date Uploaded
Search
Food security in the developing world
(pdf)
By: Ashley, John Michael
Edition: 1
Year: 2016
ISBN: N/A
LCC: | 2.66MB | Pages: 230 |
Bounding the global war on terrorism
(pdf)
By: Record, Jeffrey
Edition:
Year: 2003
ISBN: N/A
LCC: | 372.52KB | Pages: 56 |
Computer incident response and product security
(pdf)
By: Rajnovic, Damir
Edition: 1
Year: 2011
ISBN: N/A
LCC: | 2.88MB | Pages: 225 |
Building security rating system : checklists to assess risks, consequences, and security countermeasures
(pdf)
By: Building Rating Security Committee, Mohammed M. Ettouney, Ph.D., P.E
Edition:
Year: 2015
ISBN: N/A
LCC: | 2.05MB | Pages: 166 |
SEC501.5: Malware
(pdf)
By: Pedro Bueno
Edition: A12_02
Year: 2016
ISBN: N/A
LCC: | 28.85MB | Pages: 376 |
Protection, security, and safeguards : practical approaches and perspectives
(pdf)
By: June, Dale L
Edition: 2nd ed
Year: 2013
ISBN: N/A
LCC: | 13.99MB | Pages: |
Group policy : fundamentals, security, and the managed desktop, second edition
(pdf)
By: Burchill, Alan; Hicks, Jeffery; Moskowitz, Jeremy
Edition: 2nd ed
Year: 2013
ISBN: N/A
LCC: | 33.56MB | Pages: 912 |
SEC501.3: Pentest
(pdf)
By: Eric Cole; David Shackleford
Edition: A12_02
Year: 2016
ISBN: N/A
LCC: | 11.03MB | Pages: 241 |
黑客工具全攻略
(pdf)
By: 天河文化
Edition:
Year: 2015
ISBN: N/A
LCC: | 248.33MB | Pages: 0 |
SEC501.6: Data Loss Prevention
(pdf)
By: Eric Cole
Edition: A12_02
Year: 2016
ISBN: N/A
LCC: | 9.24MB | Pages: 185 |
Pro ASP.NET web API security : securing ASP.NET web API
(epub)
By: Lakshmiraghavan, Badrinarayanan
Edition:
Year: 2013
ISBN: N/A
LCC: | 5.85MB | Pages: 416 |
Security without Obscurity
(pdf)
By: Epstein, W. Clay; Stapleton, Jeffrey James
Edition:
Year: 2016
ISBN: N/A
LCC: | 21.69MB | Pages: 336 |
Managing risk and information security : protect to enable
(pdf)
By: Harkins, Malcolm
Edition:
Year: 2013
ISBN: N/A
LCC: | 3.28MB | Pages: 152 |
SEC501.1: Defensive Network Infrastructure
(pdf)
By: Eric Cole; Ted Demopoulos
Edition: A12_02
Year: 2016
ISBN: N/A
LCC: | 11.58MB | Pages: 235 |
Biodefense : research methodology and animal models
(pdf)
By: Swearengen, James R
Edition: 2nd ed
Year: 2012
ISBN: N/A
LCC: | 16.49MB | Pages: |
Cybersecurity Enhancement Act of 2013 : report (to accompany H.R. 756) (including cost estimate of the Congressional Budget Office)
(pdf)
By:
Edition:
Year: 2013
ISBN: N/A
LCC: | 16.84MB | Pages: 102 |
CISM Review Manual 15th Edition
(pdf)
By: CISM Review Manual 15th Edition
Edition:
Year: 0
ISBN: N/A
LCC: | 35.78MB | Pages: 292 |
Critical infrastructure : homeland security and emergency preparedness
(pdf)
By: McDougall, Allan; Radvanovsky, Robert
Edition: 3rd ed
Year: 2013
ISBN: N/A
LCC: | 4.06MB | Pages: |
Elliptic curves and their applications to cryptography : an introduction
(pdf)
By: Enge, Andreas
Edition: 1999
Year: 1999
ISBN: N/A
LCC: | 5.69MB | Pages: 164 |
Meteorology and energy security : simulations, projections, and management
(pdf)
By: Samuel, Paul S
Edition:
Year: 2016
ISBN: N/A
LCC: | 30.85MB | Pages: |
Space security 2010
(pdf)
By: Jaramillo, Cesar
Edition:
Year: 2010
ISBN: N/A
LCC: | 3.68MB | Pages: 250 |
白帽子讲Web扫描
(pdf)
By: 刘漩
Edition:
Year: 2017
ISBN: N/A
LCC: | 21.37MB | Pages: 248 |
Practical embedded security : building secure resource-constrained systems
(epub)
By: Stapko, Timothy John
Edition: 1
Year: 2008
ISBN: N/A
LCC: | 10.05MB | Pages: 280 |
Deploying Microsoft Forefront Protection 2010 for Exchange Server
(pdf)
By: Diogenes, Yuri; Shinder, Thomas W
Edition: 1
Year: 2010
ISBN: N/A
LCC: | 4.26MB | Pages: 81 |
最新黑客攻防从入门到精通
(pdf)
By: 天河文化
Edition:
Year: 2015
ISBN: N/A
LCC: | 320.02MB | Pages: 419 |
白帽子讲浏览器安全
(pdf)
By: 钱文祥
Edition:
Year: 2016
ISBN: N/A
LCC: | 11.23MB | Pages: 332 |
All-hazards risk and resilience : prioritizing critical infrastructure using the RAMCAP Plus approach
(pdf)
By: ASME Innovative Technologies Institute LLC
Edition: 1st
Year: 2009
ISBN: N/A
LCC: | 2.44MB | Pages: 155 |
Danger in the comfort zone : from boardroom to mailroom--how to break the entitlement habit that's killing American business
(pdf)
By: Judith M. Bardwick Ph.D
Edition: Revised ed
Year: 1995
ISBN: N/A
LCC: | 21.03MB | Pages: 255 |
Guidelines for the physical security of water utilities, ANSI/ASCE/EWRI 56-10 Guidelines for the physical security of wastewater/stormwater utilities, ANSI/ASCE/EWRI 57-10 (ASCE/EWRI 56-10) and Guidelines for the Physical Security of Wastewater/Stormwater Utilities
(pdf)
By: American Society of Civil Engineers
Edition:
Year: 2011
ISBN: N/A
LCC: | 1.41MB | Pages: 200 |
Guiding principles for the nation's critical infrastructure
(pdf)
By: ASCE Critical Infrastructure Guidance Task Committee
Edition:
Year: 2009
ISBN: N/A
LCC: | 790.74KB | Pages: 40 |
The Official (Isc)2 Sscp Cbk Reference
(pdf)
By: Mike Wills
Edition: Hardcover
Year: 2019
ISBN: N/A
LCC: | 6.55MB | Pages: 784 |
Web application obfuscation
(pdf)
By: Mario Heiderich, Eduardo Alberto Vela Nava, Gareth Heyes, David Lindsay
Edition: 1
Year: 2011
ISBN: N/A
LCC: | 3.06MB | Pages: 275 |
Security Warrior
(pdf)
By: Cryus Peikari,Anton Chuvakin
Edition: First Edition
Year: January 2004
ISBN: N/A
LCC: | 6.7MB | Pages: 554 |
Cyber risks for business professionals : a management guide
(pdf)
By: Kendrick, Rupert
Edition:
Year: 2010
ISBN: N/A
LCC: | 1.69MB | Pages: |
We Have Root: Even More Advice From Schneier On Security
(pdf)
By: Bruce Schneier
Edition: 1st Edition
Year: 2019
ISBN: N/A
LCC: | 5.43MB | Pages: 305 |
Open source systems security certification
(pdf)
By: Damiani, Ernesto; Ioini, Nabil El; Ardagna, Claudio Agostino
Edition: 1
Year: 2009
ISBN: N/A
LCC: | 2.1MB | Pages: 202 |
Cyberwarfare: An Introduction To Information-Age Conflict
(pdf)
By: Isaac R. Porche III
Edition: 1st Edition
Year: 2020
ISBN: N/A
LCC: | 6.94MB | Pages: 379 |
Hacking exposed, computer forensics
(pdf)
By: Philipp, Aaron; Davis, Chris; Cowen, David
Edition: 2nd ed
Year: 2010
ISBN: N/A
LCC: | 11.63MB | Pages: 518 |
Thor's Microsoft security bible : a collection of practical security techniques
(pdf)
By: Timothy ''Thor'' Mullen
Edition: 1
Year: 2011
ISBN: N/A
LCC: | 14.8MB | Pages: 315 |
Federated identity primer
(epub)
By: Rountree, Derrick
Edition: 1
Year: 2013
ISBN: N/A
LCC: | 6.45MB | Pages: 96 |
Handbook Of Big Data Privacy
(pdf)
By: Kim-Kwang Raymond Choo, Ali Dehghantanha
Edition: 1st Edition
Year: 2020
ISBN: N/A
LCC: | 12.38MB | Pages: 397 |
Mobile Forensics – Advanced Investigative Strategies
(pdf)
By: Oleg Afonin; Vladimir Katalov
Edition: Second
Year: 2016
ISBN: N/A
LCC: | 17.89MB | Pages: 0 |
21st century security and CPTED : designing for critical infrastructure protection and crime prevention
(pdf)
By: Atlas, Randall I
Edition: 2nd ed
Year: 2013
ISBN: N/A
LCC: | 172.9MB | Pages: 916 |
SEC501.4: First Responder
(pdf)
By: Eric Cole
Edition: A12_02
Year: 2016
ISBN: N/A
LCC: | 10.96MB | Pages: 199 |
Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineers
(epub)
By: O'Connor, T. J
Edition: 1
Year: 2013
ISBN: N/A
LCC: | 1.81MB | Pages: 262 |
Info Security Magazine, Vol 15, No 2; 2018 Q2
(pdf)
By: Infosecurity Magazine
Edition:
Year: 2018
ISBN: N/A
LCC: | 10.22MB | Pages: 52 |
Wireless reconnaissance in penetration testing
(epub)
By: Neely, Matthew; Sanyk, Chris; Hamerstone, Alex
Edition: 1
Year: 2013
ISBN: N/A
LCC: | 3.24MB | Pages: 226 |
白帽子讲Web安全
(pdf)
By: 吴翰清
Edition: 纪念版
Year: 2014
ISBN: N/A
LCC: | 21.71MB | Pages: 449 |
Burp Suite Essentials
(pdf)
By: Akash mahajan
Edition:
Year: 2014
ISBN: N/A
LCC: | 2.78MB | Pages: 144 |
Mastering Linux Security And Hardening: Protect Your Linux Systems From Intruders, Malware Attacks, And Other Cyber Threats
(pdf)
By: Donald A. Tevault
Edition: 2nd Edition
Year: 2020
ISBN: N/A
LCC: | 17.81MB | Pages: 652 |
‹
1
2
›
All Categories
Fiction
Fiction
Art
Art
Cinema
Design: Architecture
Graphic Arts
Music
Music: Guitar
Photo
Biology
Biology
Anthropology
Anthropology: Evolution
Biochemistry
Biophysics
Biostatistics
Biotechnology
Ecology
Genetics
Microbiology
Molecular
Plants: Agriculture and Forestry
Plants: Botany
Virology
Zoology
Business
Business
Accounting
E-Commerce
MLM
Management
Management: Project Management
Marketing
Marketing: Advertising
Responsibility and Business Ethics
Trading
Chemistry
Chemistry
Analytical Chemistry
Chemical
Inorganic Chemistry
Materials
Organic Chemistry
Physical Chemistry
Pyrotechnics and explosives
Computers
Computers
Algorithms and Data Structures
Algorithms and Data Structures: Cryptography
Algorithms and Data Structures: Pattern Recognition
Cryptography
Cybernetics
Cybernetics: Artificial Intelligence
Databases
Information Systems
Lectures, monographs
Media
Networking
Networking: Internet
Operating Systems
Organization and Data Processing
Programming
Programming: Compilers
Programming: Games
Programming: Libraries API
Programming: Modeling languages
Programming: Programming Languages
Security
Software: Adobe Products
Software: CAD
Software: Office software
System Administration
Web-design
Economy
Economy
Econometrics
Investing
Markets
Mathematical Economics
Popular
Education
Education
Elementary
Encyclopedia
self-help books
Geography
Geography
Geodesy. Cartography
Local History
Local history: Tourism
Russia
Geology
Geology
Hydrogeology
Mining
History
History
American Studies
Archaeology
Memoirs, Biographies
Military History
leisure
leisure
Jurisprudence
Jurisprudence
Criminology, Forensic Science
Criminology: Court. examination
Law
Linguistics
Linguistics
Comparative Studies
Dictionaries
Foreign
Foreign: English
Foreign: French
Linguistics
Russian Language
Stylistics
Literature
Literature
Children
Comics
Detective
Fantasy
Fiction
Folklore
Library
Literary
Poetry
Prose
Mathematics
Mathematics
Algebra
Algebra: Linear Algebra
Algorithms and Data Structures
Analysis
Applied Mathematicsematics
Computational Mathematics
Differential Equations
Discrete Mathematics
Dynamical Systems
Elementary
Functional Analysis
Geometry and Topology
Graph Theory
Lectures
Logic
Mathematicsematical Physics
Mathematicsematical Statistics
Number Theory
Numerical Analysis
Optimal control
Probability
Puzzle
Medicine
Medicine
Anatomy and physiology
Anesthesiology and Intensive Care
Cardiology
Chinese Medicine
Clinical Medicine
Dentistry, Orthodontics
Dermatology
Diabetes
Diseases
Diseases: Internal Medicine
ENT
Endocrinology
Epidemiology
Histology
Infectious diseases
Molecular Medicine
Natural Medicine
Neurology
Oncology
Ophthalmology
Pediatrics
Pharmacology
Popular scientific literature
Surgery, Orthopedics
Therapy
Trial
Yoga
immunology
Sciences
Sciences
Sport
Sport
Physics
Physics
Astronomy
Astronomy: Astrophysics
Electricity and Magnetism
Electrodynamics
General courses
Geophysics
Mechanics
Mechanics: Fluid Mechanics
Mechanics: Strength of Materials
Optics
Physics of lasers
Physics of the Atmosphere
Quantum Mechanics
Quantum Physics
Solid State Physics
Spectroscopy
Thermodynamics and Statistical Mechanics
Psychology
Psychology
Creative Thinking
Hypnosis
Love, erotic
Neuro-Linguistic Programming
Pedagogy
The art of communication
Religion
Religion
Buddhism
Esoteric, Mystery
Orthodoxy
Technique
Technique
Aerospace Equipment
Automation
Communication
Construction
Construction: Cement Industry
Electronics
Electronics: Electronics
Electronics: Microprocessor Technology
Electronics: Radio
Electronics: Signal Processing
Electronics: TV. Video
Electronics: Telecommunications
Electronics: VLSI
Energy
Industry: Metallurgy
Instrument
Materials
Metrology
Missiles
Oil and Gas Technologies
Safety and Security
Transport
Transportation: Aviation
Transportation: Rail
Transportation: Ships
Water Treatment
industrial equipment and technology
Transportation: Cars, motorcycles
Technology
Technology
Mechanical Engineering
Space Science