Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Teaches users how to select passwords that always meet complexity requirements. This book examines the password problem from the perspective of the administrator trying to secure their network.
Contains information of dedicated exploit, vulnerability, and tool code along with corresponding instruction. This book also includes a CD which contains both commented and uncommented versions of the source code examples presented throughout, along with a copy of the author-developed Hacker Code Library v1.0.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.