Libro
|
The bar code book: reading, printing, specification of bar code symbols
|
Palmer, Roger C.
|
2nd ed.
(1991)
|
Domicilio
|
----------
|
Libro
|
The tao of network security monitoring: beyond intrusion detection
|
Bejtlich, Richard
|
1st ed.
(2005)
|
Domicilio
|
----------
|
Libro
|
Tivoli Public Key Infrastructure release notes: Version 3 Release 7.1
|
Sin autor
|
(2001)
|
Domicilio
|
----------
|
Libro
|
Tivoli Risk Manager developer`s guide: Version 3 Release 8
|
Sin autor
|
(2001)
|
Domicilio
|
----------
|
Libro
|
Tivoli Risk Manager release notes: Version 3 Release 8
|
Sin autor
|
(2001)
|
Domicilio
|
----------
|
Artículo
|
UNIX password security: Ten years later
|
Feldmeier, David C.
|
(1989)
|
|
----------
|
Artículo
|
Uso de dispositivos móviles y BYOD : su impacto en la seguridad
|
Macia, Nicolás
|
(2015)
|
|
----------
|
Libro
|
Virtual honeypots: from botnet tracking to intrusion detection
|
Provos, Niels
|
1a ed.
(c2008)
|
Domicilio
|
----------
|
Libro
|
Web security, privacy, and commerce
|
Garfinkel, Simson
|
2nd ed.
(2002)
|
Domicilio
|
----------
|
Libro
|
Windows forensic analysis toolkit: advanced analysis techniques for Windows 7
|
Carvey, Harlan
|
3rd ed.
(2012)
|
Domicilio
|
----------
|