由买买提看人间百态

boards

本页内容为未名空间相应帖子的节选和存档,一周内的贴子最多显示50字,超过一周显示500字 访问原贴
Security版 - Biometrics and Network Security
相关主题
Network Security Hacks请问哪里有关于encryption/decryption的相关学习资料
Securing IIS 6.0High Performance MySQL: Optimization, Backups ...
CYA: Securing Exchange Server 2003 ...[转载] BSD Sockets Programming ...
Snort 2.1 Intrusion Detection, Second Edition[转载] Professional Apache Tomcat 5
Network Security AssessmentXML Programming Bible
Securing Wireless LAN'sFoundations of Soft Case-Based Reasoning
Investigator's Guide to Steganography申请公民的申请费和biometrics fee 是写一张支票,还是分着写两 (转载)
Stealing the Network: How to Own the BoxUnder the bridge by Red Hot Chili Pepper
相关话题的讨论汇总
话题: security话题: network话题: biometrics话题: thwarting话题: oxymoronic
进入Security版参与讨论
1 (共1页)
os
发帖数: 81
1
osted from LISF
Download Address: http://www.lanken.com/forum/viewtopic.php?t=58
Biometrics and Network Security.
ISBN: 0-13-101549-4, Prentice Hall PTR, December 2003.
288 Pages, Paperback.
The complete guide to implementing biometric security solutions
for your network. Network security has become the latter-day equivalent
of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper
headlines are routinely peppered with incidents of hackers thwarting
the security put forth by th
1 (共1页)
进入Security版参与讨论
相关主题
Under the bridge by Red Hot Chili PepperNetwork Security Assessment
各位买了牛肉干的,请report一下那种不是洗脚水Securing Wireless LAN's
牛肉干真好吃,买少了Investigator's Guide to Steganography
OPT 申请 是否都需要biometrics and fingerprints??Stealing the Network: How to Own the Box
Network Security Hacks请问哪里有关于encryption/decryption的相关学习资料
Securing IIS 6.0High Performance MySQL: Optimization, Backups ...
CYA: Securing Exchange Server 2003 ...[转载] BSD Sockets Programming ...
Snort 2.1 Intrusion Detection, Second Edition[转载] Professional Apache Tomcat 5
相关话题的讨论汇总
话题: security话题: network话题: biometrics话题: thwarting话题: oxymoronic