- DocumentBlindfolded SQL Injectionîncărcat deFTBooks
- DocumentBeating IT Risksîncărcat deFTBooks
- DocumentAnalysis of a Telnet Session Hijack via Spoofed MAC Addressesîncărcat deFTBooks
- DocumentAn Example of the RSA Algorithmîncărcat deFTBooks
- DocumentAlternate Data Streams in NTFSîncărcat deFTBooks
- DocumentA Little Bit About Buffer Overflowsîncărcat deFTBooks
- DocumentA Comparative Analysis of Methods of Defense Against Buffer Overflow Attacksîncărcat deFTBooks
- DocumentAppleîncărcat deFTBooks