-Android Forensics: Investigation, Analysis and Mobile Security for Google Android by Andrew Hoog
-Hacker's Black Book: Important Hacking and Security Informations for Every Internet User
+Linux Kernel Development (3rd Edition) [Paperback]
+The Linux Programming Interface: A Linux and UNIX System Programming Handbook [Hardcover]
+Mobile Application Security [Paperback]
-Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World ~~ (keyword Good)
-Mobile Malware Attacks and Defense
-Programming the Mobile Web by Maximiliano Firtman (Jul 30, 2010)
-Linux Device Drivers (Nutshell Handbooks) by Alessandro Rubini (Feb 24, 1998)
<www.trust2011.org>
Trust and Trustworthy Computing: Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings (Lecture Notes in Computer Science / Security and Cryptology) by Alessandro Acquisti, Sean W. Smith and Ahmad-Reza Sadeghi (Aug 11, 2010)
+Hacking Exposed: Malware & Rootkits Secrets & Solutions
-Security Power Tools by Bryan Burns, Dave Killion, Nicolas Beauchesne and Eric Moret
-Security Tokens: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors
-End-User Monitoring: What you Need to Know For It Operations Management by
-Hacker's Black Book: Important Hacking and Security Informations for Every Internet User
+Linux Kernel Development (3rd Edition) [Paperback]
+The Linux Programming Interface: A Linux and UNIX System Programming Handbook [Hardcover]
+Mobile Application Security [Paperback]
-Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World ~~ (keyword Good)
-Mobile Malware Attacks and Defense
-Programming the Mobile Web by Maximiliano Firtman (Jul 30, 2010)
-Linux Device Drivers (Nutshell Handbooks) by Alessandro Rubini (Feb 24, 1998)
<www.trust2011.org>
Trust and Trustworthy Computing: Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings (Lecture Notes in Computer Science / Security and Cryptology) by Alessandro Acquisti, Sean W. Smith and Ahmad-Reza Sadeghi (Aug 11, 2010)
+Hacking Exposed: Malware & Rootkits Secrets & Solutions
-Security Power Tools by Bryan Burns, Dave Killion, Nicolas Beauchesne and Eric Moret
-Security Tokens: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors
-End-User Monitoring: What you Need to Know For It Operations Management by
'eBooks & Seminar' 카테고리의 다른 글
C++ Hackers Guide (0) | 2013.06.21 |
---|---|
PC H/W 보안을 공부 하신다면... (0) | 2011.11.25 |
(펌) Guide to the Secure Configuration of Red Hat Enterprise Linux 5 (NSA) (0) | 2011.11.25 |
프로젝트 개발 과정 이해 (0) | 2010.05.13 |
Secure Internet Banking Authentication (0) | 2010.04.28 |