Artboard 33atençãoArtboard 18atualizarconectividadeArtboard 42boletocarrinhocartãoArtboard 45cartão SaraivacelularArtboard 42Artboard 23checkArtboard 28Artboard 17?compararcompartilharcompartilhar ativoArtboard 28Artboard 43Artboard 49Artboard 47ver-detalhesArtboard 15Artboard 32ebookArtboard 22Artboard 5Artboard 25Artboard 1Artboard 42Artboard 11fecharfilmesArtboard 23gamesArtboard 4Artboard 9Artboard 6hqimportadosinformáticaArtboard 7Artboard 3Artboard 12Artboard 25Artboard 34Artboard 43Artboard 44curtirArtboard 24Artboard 13livrosArtboard 24Artboard 31menumúsicaArtboard 27Artboard 30Artboard 36Artboard 44outrospapelariaArtboard 17Artboard 6Artboard 27Artboard 30Artboard 29Artboard 26Artboard 2Artboard 20Artboard 35estrelaestrela ativorelógiobuscaArtboard 50Artboard 26toda saraivaArtboard 40Artboard 21Artboard 10Artboard 37usuárioArtboard 46Artboard 33Artboard 8seta

Resultados para: exploit

11 produtos
  • e-book

    Zero-Day Exploit:: Countdown to Darkness

    Sachs,Marcus; Shein,Rob
    (3028112)

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious 'Zero-Day' attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to...

  • - -
    audio livro

    Exploit Online Demand

    (ubook-191660)
    (Assinatura Mensal com Conteúdo Ilimitado)
  • e-book

    Survive, Exploit, Disrupt - Action Guidelines...

    Steidl,Peter
    (9308068)

    Recessions -- there may not be anything we can do to stop them, but we have plenty of choices when it comes to our response. During a recession too much time can be spent trying to guess what impact it may have, while too little time is spent...

  • e-book

    The Last Exploit of Harry the Actor (A...

    Ernest Bramah
    (9556818)

    This early work by Ernest Bramah was originally published in 1914 and we are now republishing it with a brand new introduction. 'The Last Exploit of Harry the Actor' is a mystery of an unexplainable bank robbery. Ernest Bramah Smith was born was near...

  • e-book

    The Economist Guide to Intellectual Property...

    Johnson,Stephen
    (9606348)

    IP accounts for an estimated $5trn of GDP in the US alone. It covers patents, trademarks, domain names, copyrights, designs and trade secrets. Unsurprisingly, companies zealously guard their own ideas and challenge the IP of others. Damages arising...

  • - -
    audio livro

    Liars: How Progressives Exploit Our Fears For...

    (ubook-476691)

    Glenn Beck, #1 bestselling author and radio host, reveals the cold truth behind the ideology of progressivism and how the tenets of this dangerous belief system are eroding the foundation of this country.<BR><BR>WHY DO WE ACCEPT THE LIES?<BR>...

    (Assinatura Mensal com Conteúdo Ilimitado)
  • e-book

    Understanding Markets and Strategy - How to...

    MORLEY,MALCOLM
    (9690567)

    Understanding Markets and Strategy explains the context, meaning and value of markets and how to make the best decisions by putting the business into the context of the market, rather than the other way around.

  • e-book

    Feminism Seduced - How Global Elites Use...

    Eisenstein,Hester
    (9501886)

    In a pioneering reinterpretation of the role of mainstream feminism, Eisenstein shows how the ruling elites of developed countries utilize women's labor and the ideas of women's liberation and empowerment to maintain their economic and political...

  • Zero-Day Exploit

    Shein,Rob
    (1089733)

    Zero-Day Exploit

    Produto indisponível

  • Ethel Opens The Door - An Exploit Of The...

    Fox,David
    (10042004)

    Excerpt from Ethel Opens the Door: An Exploit of the Shadowers, Inc He paused suggestively and glanced at the well-built, aristocratic looking man of forty-five, who sat at the head of the council table, but Rex Powell's level gray eyes were fastened...

    Produto indisponível

  • Web Application Vulnerabilities

    Palmer, Steven
    (3053635)

    In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how...

    Produto indisponível

Busca por