Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты John Chirillo. Hack Attacks Revealed. – М.: , 2001. – 960 с. Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с. Johnny Cache, Joshua Wright, Vincent Liu. Hacking Exposed: Wireless. – М.: McGraw-Hill, 2010. – 512 с. Chris Prosise, Kevin Mandia, Matt Pepe. Incident Response & Computer Forensics. – М.: McGraw-Hill/Osborne, 2003. – 508 с. Дополнительные результаты Victor Cheng. Case Interview Secrets: A Former McKinsey Interviewer Reveals How to Get Multiple Job Offers in Consulting. – М.: Innovation Press, 2012. – 292 с. Martin Kaplan. What the IRS Doesn't Want You to Know : A CPA Reveals the Tricks of the Trade (What the IRS Doesn't Want You to Know). – М.: , 0. – 0 с. David M. Levy. How the Dismal Science Got Its Name : Classical Economics and the Ur-Text of Racial Politics. – М.: , 0. – 0 с. Price M. Cobbs, Judith L. Turnock. Cracking the Corporate Code: The Revealing Success Stories of 32 African-American Executives. – М.: , 0. – 0 с. Brad Henson. Heart Attack Survivor: A Field Guide. – М.: , 0. – 0 с. G. William Dauphinais. Straight from the Ceo: The World's Top Business Leaders Reveal Ideas That Every Manager Can Use. – М.: , 0. – 0 с. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с. David M. Levy. How the Dismal Science Got Its Name : Classical Economics and the Ur-Text of Racial Politics. – М.: , 0. – 0 с. Inside the Minds Staff, Inside the Minds staff. Building a $1,000,000 Nest Egg: Leading Financial Minds Reveal the Simple, Proven Ways for Anyone to Build a $1,000,000 Nest Egg On Your Own Terms. – М.: , 0. – 0 с. George D. Hack. Site Selection for Growing Companies. – М.: , 0. – 0 с. Eric Dezenhall. Nail 'Em!: Confronting High-Profile Attacks on Celebrities & Businesses. – М.: , 0. – 0 с. Jay Conrad Levinson. Guerrilla Marketing Attack: New Strategies, Tactics, and Weapons for Winning Big Profits for Your Small Business. – М.: Houghton Mifflin Co, 1989. – 208 с. T. F. Peterson. Nightwork: A History of Hacks and Pranks at MIT. – М.: The MIT Press, 2003. – 190 с. Paul Bausch. Amazon Hacks: 100 Industrial-Strength Tips and Tools. – М.: O'Reilly, 0. – 304 с. Bonnie Biafore. Online Investing Hacks (Hacks). – М.: , 0. – 0 с. Питер Лилли. Грязные сделки. Тайная правда о мировой практике отмывания денег, международной преступности и терроризме. – Ростов-на-Дону: Феникс, 2005. – 400 с. Richard Hack. Clash of the Titans: How the Unbridled Ambition of Ted Turner and Rupert Murdoch Has Created Global Empires that Control What We Read and Watch Each Day. – М.: , 2003. – 0 с. The Arab World Competitiveness Report 2002-2003 (Economics). – М.: , 2003. – 0 с. William C. Moore. Wall Street: Its Mysteries Revealed-its Secrets Exposed. – М.: , 2005. – 0 с. Randolph J. Trappey. Brand Choice : Revealing Customers' Unconscious-Automatic and Strategic Thinking Process. – М.: , 2005. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Hadley Stern. iPod and iTunes Hacks : Tips and Tools for Ripping, Mixing and Burning (Hacks). – М.: O'Reilly Media, 2004. – 456 с. John Perkins. Confessions of an Economic Hit Man. – М.: , 2004. – 264 с. Hugh Burkitt, John Zealley. Marketing Excellence: Winning Companies Reveal the Secrets of Their Success. – М.: , 2007. – 388 с. Dan Seidman. Sales Autopsy: 50 Postmortems Reveal What Killed the Sale (and what might have saved it). – М.: , 2006. – 192 с. Annalee Newitz. Pretend We're Dead: Capitalist Monsters in American Pop Culture. – М.: , 2006. – 223 с. David Fischman. The Secret of the Seven Seeds: A Parable of Leadership and Life. – М.: , 2006. – 208 с. Liza Siegel. Suite Success: The Psychologist from the Apprentice Reveals What It Really Takes to Excel-in the Boardroom And in Life. – М.: , 2006. – 238 с. Robert Pollin. Contours of Descent: U.S. Economic Fractures and the Landscape of Global Austerity. – М.: , 2005. – 270 с. The Economic Impacts of Terrorist Attacks. – М.: , 2006. – 315 с. Wayne Madsen. Jaded Tasks: Brass Plates, Black Ops & Big Oil-The Blood Politics of George Bush & Co. – М.: , 2006. – 384 с. Richard Hack. Hughes: The Private Diaries, Memos and Letters; The Definitive Biography of the First American Billionaire. – М.: , 2006. – 456 с. Rachel Bridge. My Big Idea: 30 Successful Entrepreneurs Reveal How They Found Inspiration. – М.: , 2006. – 192 с. Joseph W. Koletar. The FBI Career Guide: Inside Information on Getting Chosen for And Succeeding in One of the Toughest Most Prestigious Jobs in the World. – М.: , 2006. – 207 с. Paul Szatkowski. The Secret Revealed. – М.: , 2008. – 72 с. Garrett Sutton. Rich Dad's Advisors: Own Your Own Corporation: Why the Rich Own Their Own Companies and Everyone Else Works for Them (Rich Dad's Advisors). – М.: , 2008. – 272 с. Daniel Gardner. The Science of Fear: Why We Fear the Things We Shouldn't--and Put Ourselves in Greater Danger. – М.: , 2008. – 352 с. Rachel Bronson. Thicker Than Oil: America's Uneasy Partnership with Saudi Arabia. – М.: , 2008. – 384 с. Andy Walker. Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem (Absolute Beginner's Guide). – М.: , 2008. – 480 с. Ken Dunham, Jim Melnick. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet. – М.: , 2008. – 168 с. Gregory Berns. Iconoclast: A Neuroscientist Reveals How to Think Differently. – М.: , 2008. – 224 с. Ibp Usa. Global Terrorism Attacks Encyclopedic Handbook. – М.: , 2008. – 300 с. Sean Tully, Richard Bassett. Restoring Confidence in the Financial System: See-through-leverage: A powerful new tool for revealing and managing risk. – М.: , 2010. – 167 с. Rachel Bridge. How I Made It: 40 Successful Entrepreneurs Reveal How They Made Millions. – М.: , 2010. – 256 с. Brently Clemantin. How To Start A Successful Online Business Even If You Have A Limited Budget & Have No Experience!: Secrets To Making Your Dream Of Owning A Business A ... It At A Very Low Cost Revealed (Volume 1). – М.: , 2010. – 122 с. Francis T. Cullen. Corporate Crime Under Attack. – М.: , 2010. – 350 с. Bill Jensen and Josh Klein. Hacking Work: Breaking Stupid Rules for Smart Results. – М.: Viking penguin, 2010. – 224 с. Ewen Southby -Tailyour. BLONDIE : The Life of Lieutenant-Colonel HG Hasler DSO, OBE, RM, founder of the SBS and Modern Single-handed Ocean Racing. – М.: , 2003. – 432 с. Autobiography of a Yankee Mariner: Christopher Prince and the American Revolution. – М.: , 2003. – 272 с. Graeme D. Ruxton, Thomas N. Sherratt, Michael P. Speed. Avoiding Attack: The Evolutionary Ecology of Crypsis, Warning Signals and Mimicry. – М.: Oxford University Press, 2005. – 260 с. Thomas B. Allen. Shark Attacks: Their Causes and Avoidance. – М.: The Lyons Press, 2001. – 312 с. John M. Butler. Forensic DNA Typing, Second Edition: Biology, Technology, and Genetics of STR Markers. – М.: Academic Press, 2005. – 688 с. Zaharina Velikova. A Lattice Attack on the McEliece Public Key Cryptosystem: Lattice Basis Reduction Algorithms in Cryptography. – М.: , 2008. – 132 с. Joseph Menn. Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet. – М.: PublicAffairs, 2010. – 304 с. Kevin D. Mitnick. The Art of Intrusion. – М.: , 2005. – 270 с. Martin C. Brown. Hacking Google® Maps and Google® Earth. – М.: , 2006. – 408 с. Markus Jakobsson. Phishing and Countermeasures. – М.: , 2007. – 736 с. Colin Bentley. PRINCE2в„ў Revealed. – М.: , 2010. – 304 с. Joe Grand. Game Console Hacking. – М.: , 2010. – 512 с. Lee Barken. Wireless Hacking: Projects for Wi-Fi Enthusiasts. – М.: , 2010. – 416 с. Jay Beale. Hacking and Penetration Testing Ultimate CD. – М.: , 2010. – 1 с. Johnny Long. No Tech Hacking. – М.: , 2010. – 384 с. Russ Rogers. Hacking a Terror Network: The Silent Threat of Covert Channels. – М.: , 2010. – 448 с. Michael Gregg. Hack the Stack. – М.: , 2010. – 0 с. Chris Hurley. InfoSec Career Hacking: Sell Your Skillz, Not Your Soul. – М.: , 2010. – 448 с. Rob Kraus. Seven Deadliest Microsoft Attacks. – М.: , 2010. – 192 с. Mike Shema. Seven Deadliest Web Application Attacks. – М.: , 2010. – 192 с. Frank Thornton. Kismet Hacking. – М.: , 2010. – 272 с. Thomas Wilhelm. Ninja Hacking. – М.: , 2010. – 450 с. Jayson E Street. Dissecting the Hack: The F0rb1dd3n Network, Revised Edition. – М.: , 2010. – 360 с. Ken Dunham. Mobile Malware Attacks and Defense. – М.: , 2010. – 440 с. Syngress. Hack Proofing Linux. – М.: , 2010. – 512 с. Edward Amoroso. Cyber Attacks. – М.: , 2010. – 336 с. Seth Fogie. XSS Attacks. – М.: , 2010. – 480 с. Lisa K. Simone. If I Only Changed the Software, Why is the Phone on Fire?: Embedded Debugging Methods Revealed. – М.: , 2010. – 304 с. Joe Grand. Hardware Hacking. – М.: , 2010. – 448 с. Syngress. Hack Proofing Sun Solaris 8. – М.: , 2010. – 608 с. Syngress. Hack Proofing ColdFusion. – М.: , 2010. – 0 с. Syngress. Hack Proofing Your Network 2E. – М.: , 2010. – 704 с. Justin Clarke. SQL Injection Attacks and Defense. – М.: , 2010. – 496 с. Herbert Thomson. The Mezonic Agenda: Hacking the Presidency. – М.: , 2010. – 488 с. Syngress. Hack Proofing Your Identity In The Information Age. – М.: , 2010. – 512 с. Mark Kostich. Beyond Attack. – М.: , 2010. – 96 с. W Lowrie. Attack Upon Christendom (Paper). – М.: , 1992. – 304 с. Eric Faulkner. Home Hacking Projects for Geeks. – М.: , 2005. – 336 с. Richard Af Falkenrath. America?s Achilles? Heel – Nuclear, Biological & Chemical Terrorism & Convert Attack. – М.: , 1998. – 384 с. Damian Zynda. Archbishop Oscar Romero – A Disciple Who Revealed the Glory of God. – М.: , 2010. – 200 с. Gray. Angle of Attack. – М.: , 2007. – 304 с. Ephraim Kam. Surprise Attack – The Victim?s Perspective. – М.: , 2004. – 304 с. Danny Briere. Wireless Network Hacks & Mods For Dummies®. – М.: , 2005. – 360 с. Sara Miles. How to Hack a Party Line – The Democrats & Silicon Valley Updated edition. – М.: , 2002. – 270 с. Hf Pitkin. Attack of the Blob – Hannah Arendt?s Concept of the Social. – М.: , 2000. – 366 с. Gabriella Coleman. Coding Freedom – The Pleasures and Ethics of Hacking. – М.: , 2011. – 0 с. Ncta. The 9/11 Commission Report – The Attack from Planning to Aftermath – Shorter Edition. – М.: , 2011. – 0 с. David Vespremi. Car Hacks & Mods For Dummies®. – М.: , 2004. – 384 с. Tim Jordan. Hacking. – М.: , 2008. – 200 с. David Mcneill. Hand & Mind – What Gestures Reveal about Thought (Paper). – М.: , 1996. – 428 с. Auri Rahimzadeh. Hacking the PSPTM. – М.: , 2006. – 378 с. Chris Kohler. Retro Gaming Hacks. – М.: , 2005. – 502 с. Jono Bacon. Linux Desktop Hacks. – М.: , 2005. – 342 с. Herve This. Kitchen Mysteries – Revealing the Science of Cooking. – М.: , 2010. – 232 с. Nitesh Dhanjani. Hacking – The Next Generation. – М.: , 2009. – 296 с. Preston Gralla. Windows XP Hacks 2e. – М.: , 2005. – 600 с. Michael Juntao Yuan. Nokia Smartphone Hacks. – М.: , 2005. – 256 с. Danny O?brien. Life Hacks. – М.: , 2005. – 340 с. Nigel Mcfarlane. Firefox Hacks. – М.: , 2005. – 398 с. Joshua Paul. Digital Video Hacks. – М.: , 2005. – 426 с. Paul Bausch. Yahoo! Hacks. – М.: , 2005. – 488 с. Steve Fritz. Hidden Alcatraz – The Fortress Revealed. – М.: , 2011. – 120 с. Steve Fritz. Hidden Alcatraz – The Fortress Revealed. – М.: , 2011. – 120 с. Hadley Stern. iPod and iTunes Hacks. – М.: , 2004. – 456 с. Sam Palatnik. The King in Jeopardy – The Best Techniques for Attack & Defense Rev. – М.: , 1999. – 256 с. Nightwork: A History of Hacks and Pranks at MIT. – М.: The MIT Press, 2011. – 248 с. Shannon Sofield. PayPal Hacks. – М.: , 2004. – 368 с. James Avery. Visual Studio Hacks. – М.: , 2005. – 500 с. Ian Hacking. The Social Construction of What ?. – М.: , 1999. – 270 с. Ian Hacking. Rewriting the Soul – Multiple Personality & The Sciences of Memory (Paper). – М.: , 1998. – 346 с. Ian Hacking. Mad Travelers – Reflections on the Reality of Transient Mental Illnesses (COBE). – М.: , 2002. – 256 с. John Chirillo. Hack Attacks Encyclopedia. – М.: , 2001. – 960 с. John Chirillo. Hack Attacks Denied. – М.: , 2001. – 512 с. John Chirillo. Hack Attacks Revealed. – М.: , 2001. – 960 с. Ian Hacking. Historical Ontology. – М.: , 2002. – 320 с. John Chirillo. Hack Attacks Testing. – М.: , 2003. – 560 с. Ian Hacking. The Social Construction of What?. – М.: , 2000. – 272 с. Hacking Exposed Windows: Microsoft Windows Security Secrets And Solutions, Third Edition. – М.: , 2011. – 451 с. Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с. Hacking Exposed Malware And Rootkits. – М.: , 2011. – 400 с. Aaron Philipp, David Cowen, Chris Davis. Hacking Exposed: Computer Forensics. – М.: McGraw-Hill, 2010. – 544 с. Gray Hat Hacking The Ethical Hackers Handbook, 3Rd Edition. – М.: , 2011. – 720 с. Johnny Cache, Joshua Wright, Vincent Liu. Hacking Exposed: Wireless. – М.: McGraw-Hill, 2010. – 512 с. Hacking Exposed Web Applications, 3Rd Edition. – М.: , 2011. – 482 с. David Endler, Mark Collier. Hacking Exposed VoIP: Voice Over Ip Security Secrets & Solutions. – М.: McGraw-Hill Osborne Media, 2006. – 574 с. Hacking Exposed Cisco Networks. – М.: , 2011. – 400 с. Hacking Exposed Linux. – М.: , 2011. – 813 с. Chris Prosise, Kevin Mandia, Matt Pepe. Incident Response & Computer Forensics. – М.: McGraw-Hill/Osborne, 2003. – 508 с. Ben Jackson, Champ Clark. Asterisk Hacking. – М.: , 2007. – 272 с. Jefferson Hack. Another Fashion Book. – М.: , 2009. – 272 с. Mohamed Abd El-Hack,Ali Askar and Khalid Mahrose. Heat stress alleviation in laying hens using antioxidants. – М.: LAP Lambert Academic Publishing, 2011. – 192 с. Saghar Estehghari. Impact of Client-side Vulnerabilities on Web-based E-voting Systems. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Johnny Long. Google Hacking for Penetration Testers, Volume 2. – М.: Syngress, 2007. – 448 с.
Лучшие результаты Ничего не найдено Дополнительные результаты Ничего не найдено
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Александр Лилия, благодарю за столь быстрое решение этого вопроса:) Буду ждать звонка... Если что, то сразу к вам:*)