Search Results - Offensive Security Using Python*
-
1
Authors:
Resource Type: eBook.
Categories: COMPUTERS / Security / Network Security, COMPUTERS / Security / Viruses & Malware, COMPUTERS / Internet / Online Safety & Privacy
-
2
-
3
Authors: et al.
Source: AIP Conference Proceedings; 2023, Vol. 2834 Issue 1, p1-9, 9p
-
4
Alternate Title: شناسایی راهبردهای اولویت دار برای توسعه کارآفرینی در صنعت طیور شواهدی از مشهد ایران. (Persian)
Authors: et al.
Source: Journal of Agricultural Science & Technology; Jan/Feb2026, Vol. 28 Issue 1, p65-85, 21p
Subject Terms: POULTRY industry, ENTREPRENEURSHIP, SWOT analysis, ECONOMIC development, FOOD security, TECHNOLOGICAL innovations, MULTIPLE criteria decision making, PRIVATIZATION
Geographic Terms: MASHHAD (Iran), IRAN
-
5
Authors:
Resource Type: eBook.
Categories: COMPUTERS / Languages / Python, COMPUTERS / Security / Network Security, COMPUTERS / Security / General
-
6
Alternate Title: РОЗРОБКА СИМУЛЯТОРА ДЛЯ ПІДТРИМКИ ПЛАНУВАННЯ УСПІШНОСТІ МІСІЙ БПЛА В УМОВАХ БОЙОВИХ ДІЙ. (Ukrainian)
Authors:
Source: Eastern-European Journal of Enterprise Technologies; 2025, Vol. 5 Issue 9(137), p14-26, 13p
-
7
Authors: Corey Charles Sr
Resource Type: eBook.
Subjects: Computer security, Computer viruses, Internet--Security measures, Python (Computer program language), Computer programming, Computer networks--Security measures, Internet, Electronic books
Categories: COMPUTERS / Internet / Online Safety & Privacy, COMPUTERS / Security / Viruses & Malware, COMPUTERS / Security / Network Security
-
8
Authors:
Source: Neural Computing & Applications; Feb2025, Vol. 37 Issue 6, p4439-4453, 15p
-
9
Authors: Justin Seitz
Resource Type: eBook.
-
10
Authors: et al.
Source: Applied Sciences (2076-3417); Aug2022, Vol. 12 Issue 16, pN.PAG-N.PAG, 23p
Subject Terms: CRYPTOGRAPHY, MALWARE, COMPUTER systems, CYBERTERRORISM, INFORMATION technology security, WATERMARKS
-
11
-
12
Authors: Bassem Aly
Resource Type: eBook.
Categories: COMPUTERS / System Administration / General, COMPUTERS / Languages / Python, COMPUTERS / Software Development & Engineering / Tools
-
13
Authors: et al.
-
14
Authors:
Source: Human Behavior & Emerging Technologies; 10/7/2025, Vol. 2025, p1-18, 18p
-
15
Authors: et al.
Source: IEEE Transactions on Information Forensics & Security; 2025, Vol. 20, p11860-11875, 16p
-
16
Authors: et al.
Source: Neurosymbolic Artificial Intelligence; 10/08/2025, Vol. 1, p1-34, 34p
-
17
Authors: et al.
Source: Technologies (2227-7080); Dec2023, Vol. 11 Issue 6, p161, 26p
-
18
Authors: et al.
Source: Computation; Feb2025, Vol. 13 Issue 2, p30, 59p
-
19
-
20
Authors: Daniel G. Graham
Resource Type: eBook.
Subjects: Penetration testing (Computer security)
Categories: COMPUTERS / Security / Network Security, COMPUTERS / Languages / Python, COMPUTERS / Internet / Online Safety & Privacy
Nájsť tento článok vo Web of Science
Full Text Finder