Showing 1 - 20 results of 30 for search 'Foster, James C.', query time: 0.09s
Refine Results
In addition to media from the THWS, media from other Bavarian libraries are also displayed.
These are marked with the "Interlibrary loan" label and can be ordered by clicking on them.
These are marked with the "Interlibrary loan" label and can be ordered by clicking on them.
-
1
Bong hists 4 Jesus : a perfect constitutional storm in Alaska's capital / by Foster, James C. (James Carl)
Published 2010Call Number: Loading…Get full text
Located: Loading…
Electronic eBook -
2
Writing security tools and exploits / by Foster, James C.
Published 2006Call Number: Loading…Get full text
Located: Loading…
Electronic eBook -
3
Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals / by Foster, James C., Price, Mike (Mike Morgan)
Published 2005Call Number: Loading…Get full text
Located: Loading…
Electronic eBook -
4
Programmer's ultimate security deskref / by Foster, James C.
Published 2004Call Number: Loading…Get full text
Located: Loading…
Electronic eBook -
5
Buffer overflow attacks : detect, exploit, prevent /
Published 2005Other Authors: “…Foster, James C.…”
Call Number: Loading…Get full text
Located: Loading…
Electronic eBook -
6
InfoSec career hacking : sell your skillz, not your soul / by Bayles, Aaron W.
Published 2005Other Authors:Call Number: Loading…Get full text
Located: Loading…
Electronic eBook -
7
Snort 2.0 intrusion detection / by Beale, Jay
Published 2003Other Authors: “…Foster, James C.…”
Call Number: Loading…Get full text
Located: Loading…
Electronic eBook -
8
Land in the American West : private claims and the common good /
Published 2000Other Authors:Call Number: Loading…Get full text
Located: Loading…
Electronic eBook -
9
Bong hits 4 Jesus a perfect constitutional storm in Alaska's capital by Foster, James C.
Published 2011Call Number: Loading…Indexes
Located: Loading…
-
10
BONG HiTS 4 JESUS a perfect constitutional storm in Alaska's capital by Foster, James C.
Published 2010Call Number: Loading…
Located: Loading… -
11
Writing security tools and exploits [learn to write the security tools the other books only teach you to use ; master advanced payload generation with the metasploit framework ; se... by Foster, James C., Liu, Vincent
Published 2006Call Number: Loading…
Located: Loading… -
12
Writing security tools and exploits by Foster, James C.
Published 2006Call Number: Loading…
Located: Loading… -
13
-
14
Sockets, shellcode, porting & coding reverse engineering exploits and tool coding for security professionals by Foster, James C.
Published 2005Call Number: Loading…Get full text
Located: Loading…
-
15
Buffer overflow attacks detect, exploit, prevent by Foster, James C.
Published 2005Call Number: Loading…
Located: Loading… -
16
Sockets, shellcode, porting & coding reverse engineering exploits and tool coding for security professionals by Foster, James C.
Published 2005Call Number: Loading…Get full text
Located: Loading…
-
17
The ideology of apolitical politics elite lawyers' response to the legitimation crisis of American capitalism, 1870 - 1920 by Foster, James C.
Published 1990Call Number: Loading…
Located: Loading… -
18
The ideology of apolitical politics the elite lawyer's response to the legitimation crisis in American capitalism, 1870 - 1920 by Foster, James C.
Published 1986Call Number: Loading…
Located: Loading… -
19
Writing security tools and exploits by Foster, James C.
Published 2006Call Number: Loading…Get full text
Located: Loading…
-
20
Writing security tools and exploits by Foster, James C.
Published 2006Call Number: Loading…Get full text
Located: Loading…