Pages that link to "Template:Literature"
Jump to navigation
Jump to search
The following pages link to Template:Literature:
Displayed 100 items.
View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)- Hacking for Beginners (transclusion) (← links)
- Smart Home Hacks (transclusion) (← links)
- IoT Hackers Handbook (transclusion) (← links)
- IoT Penetration Testing Cookbook (transclusion) (← links)
- AWS Certified Solutions Architect Official Study Guide (transclusion) (← links)
- Mobile App Testing (transclusion) (← links)
- Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations (transclusion) (← links)
- Raspberry Pi. Das Manifest: Hardware, Betriebssystem, Programmierung und Elektronik (transclusion) (← links)
- The Silent Intelligence: The Internet of Things (transclusion) (← links)
- The Amazon Way on IoT: 10 Principles for Every Leader from the World's Leading Internet of Things Strategies (transclusion) (← links)
- MicroPython for the Internet of Things: A Beginner’s Guide to Programming with Python on Microcontrollers (transclusion) (← links)
- Z-Wave: Die Funktechnologie für das Smart Home (transclusion) (← links)
- Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis (transclusion) (← links)
- The Car Hacker's Handbook: A Guide for the Penetration Tester (transclusion) (← links)
- Vehicular ad hoc Networks: Standards, Solutions, and Research (transclusion) (← links)
- Mobile Hacking: Ein kompakter Einstieg ins Penetration Testing mobiler Applikationen - iOS, Android und Windows Mobile (transclusion) (← links)
- Hacking mit Python: Fehlersuche, Programmanalyse, Reverse Engineering (transclusion) (← links)
- Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts (transclusion) (← links)
- Internet-of-Things (IoT) Systems: Architectures, Algorithms, Methodologies (transclusion) (← links)
- Hash Crack: Password Cracking Manual (v3) (transclusion) (← links)
- Click Here to Kill Everybody: Security and Survival in a Hyper-connected World (transclusion) (← links)
- USB Rubber Ducky Field Guide (transclusion) (← links)
- Hacking - The Art of Exploitation - 2nd Edition (transclusion) (← links)
- Computernetze und Internet-of-Things (transclusion) (← links)
- Physical Penetration Testing (transclusion) (← links)
- Security Testing with Raspberry Pi (transclusion) (← links)
- The Hardware Hacker (transclusion) (← links)
- Metasploit - The Penetration Tester's Guide (transclusion) (← links)
- Google Hacking for Penetration Testers - 3rd Edition (transclusion) (← links)
- MicroPython Projects (transclusion) (← links)
- Advanced Penetration Testing - Hacking IoT (transclusion) (← links)
- Practical Python Programming for IoT (transclusion) (← links)
- Hardware Security - A Hands-On Approach (transclusion) (← links)
- Penetration Testing with Raspberry Pi - 2nd Edition (transclusion) (← links)
- The Hacker Playbook 3 (transclusion) (← links)
- The Hacker Playbook 2 (transclusion) (← links)
- The Hacker Playbook 1 (transclusion) (← links)
- The Art of Deception: Controlling the Human Element of Security (transclusion) (← links)
- Penetration Testing: A Hands-On Introduction to Hacking (transclusion) (← links)
- Cracking Codes with Python: Introduction to Building and Breaking Ciphers (transclusion) (← links)
- Praktische Einführung in Hardware Hacking (transclusion) (← links)
- The Internet of Things: Enabling Technologies, Platforms, and Use Cases 1st Edition (transclusion) (← links)
- Hacking Internet of Things: Bluetooth Low Energy (transclusion) (← links)
- IoTNOW 02-03/2016 (transclusion) (← links)
- Android User 08/2013 (transclusion) (← links)
- Raspberry Pi Geek 03/2014 (transclusion) (← links)
- The Gameduino 2 (transclusion) (← links)
- Der Softwerker (transclusion) (← links)
- Kurs- und Seminarmethoden (transclusion) (← links)
- English Grammar in Use (transclusion) (← links)
- Train the Trainer (transclusion) (← links)
- Visualisieren Präsentieren Moderieren Der Klassiker - 27. Auflage (transclusion) (← links)
- Embedded Design for IoT with Renesas Synergy (transclusion) (← links)
- HCS08 Unleashed: Designer's Guide To the HCS08 Microcontrollers (transclusion) (← links)
- Coole Projekte mit Raspberry Pi (transclusion) (← links)
- Die elektronische Welt mit Raspberry Pi entdecken (transclusion) (← links)
- Linux mit Raspberry Pi (transclusion) (← links)
- Hausautomation mit Raspberry Pi (transclusion) (← links)
- Embedded Linux mit dem Raspberry Pi für Ein- und Umsteiger (transclusion) (← links)
- Memory Allocation Problems in Embedded Systems (transclusion) (← links)
- Getting Started with Arduino (transclusion) (← links)
- Cryptography for Developers (transclusion) (← links)
- Journal of Cryptology Volume 32 Number 3 July 2019 (transclusion) (← links)
- Journal of Cryptology Volume 32 Number 2 April 2019 (transclusion) (← links)
- Journal of Cryptology Volume 32 Number 1 January 2019 (transclusion) (← links)
- IX Magazin für professionelle Informationstechnik 5/2021 (transclusion) (← links)
- IX Magazin für professionelle Informationstechnik 8/2020 (transclusion) (← links)
- IX Magazin für professionelle Informationstechnik 3/2021 (transclusion) (← links)
- Internet Cryptography 1st Edition (transclusion) (← links)
- Beginning Cryptography with Java 1st Edition (transclusion) (← links)
- A Short Course in Discrete Mathematics (transclusion) (← links)
- Secure Smart Embedded Devices, Platforms and Applications (transclusion) (← links)
- Softwareentwicklung in C für Mikroprozessoren und Mikrocontroller, 7. Auflage (transclusion) (← links)
- Sprechen Sie Java?: Eine Einführung in das systematische Programmieren, 5. Auflage (transclusion) (← links)
- Test-Driven Development: A Practical Guide (transclusion) (← links)
- Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design 1st Edition (transclusion) (← links)
- Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd Edition (transclusion) (← links)
- Embedded Firmware Solutions - Development Best Practice for the Internet of Things (transclusion) (← links)
- Softwareentwicklung in C für Mikroprozessoren und Mikrocontroller, 4. Auflage (transclusion) (← links)
- The definitive guide to ARM Cortex-M0 and Cortex-M0+ ProcessorsThe Definitive Guide to Arm® Cortex®-M0 and Cortex-M0+ Processors, Second Edition (transclusion) (← links)
- MySQL for the Internet of Things (transclusion) (← links)
- Einstieg in Java und OOP (transclusion) (← links)
- Head First C (transclusion) (← links)
- Secure Coding in C and C++, Second Edition (transclusion) (← links)
- Real-World Cryptography (transclusion) (← links)
- Threat Modeling: Designing for Security (transclusion) (← links)
- Cryptography in C and C++ 1st Edition (transclusion) (← links)
- Malware Analysis Techniques: Tricks for the triage of adversarial software 1st Edition (transclusion) (← links)
- Writing Security Tools and Exploits 1st Edition (transclusion) (← links)
- Social Engineering: The Science of Human Hacking, 2nd Edition (transclusion) (← links)
- Bulletproof TLS and PKI, Second Edition: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications 2nd ed. Edition (transclusion) (← links)
- Securing Docker: The Attack and Defense Way (transclusion) (← links)
- Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code 1st Edition (transclusion) (← links)
- Network Security Essentials: Applications and Standards 6th Edition (transclusion) (← links)
- SmartHome Hacks Hausautomatisierung selber machen (transclusion) (← links)
- Practical Internet-of-Things Security (transclusion) (← links)
- Weniger schlecht Programmieren (transclusion) (← links)
- C't Make: 02/18 Magazine (transclusion) (← links)
- Internet of Things Manifest (transclusion) (← links)
- IoT-Hacking Sicherheitslücken im Internet der Dinge erkennen und schließen (transclusion) (← links)