Computing and Information Technology > Computer security

Vis mig kun

Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies

Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies

Athar

2190,77 DKK

Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances

Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances

Te-Shun

2190,77 DKK

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

Li

2190,77 DKK

Breakdowns in Computer Security

Breakdowns in Computer Security

Rentell, Michael E

223,05 DKK

Security for Small Computer Systems

Security for Small Computer Systems

Saddington, Tricia

223,05 DKK

Computer Security

Computer Security

Carroll, John M.

473,39 DKK

Advanced Persistent Training

Advanced Persistent Training

Schroeder, Jordan

403,64 DKK

Privileged Attack Vectors

Privileged Attack Vectors

Hibbert, Brad

192,41 DKK

Complete Guide to Burp Suite

Complete Guide to Burp Suite

Rahalkar, Sagar

310,39 DKK

Computer Risk Manager

Computer Risk Manager

Pursall, K.R.

2190,77 DKK

Privileged Attack Vectors

Privileged Attack Vectors

Hibbert, Brad

192,41 DKK

Professional Red Teaming

Professional Red Teaming

Oakley, Jacob G.

288,10 DKK

Professional Red Teaming

Professional Red Teaming

Oakley, Jacob G.

288,10 DKK

Waging Cyber War

Waging Cyber War

Oakley, Jacob G.

288,10 DKK

Big Breaches

Big Breaches

Elbayadi, Moudy

238,03 DKK

Firewalls Don't Stop Dragons

Firewalls Don't Stop Dragons

Parker, Carey

288,10 DKK

Advanced Persistent Training

Advanced Persistent Training

Schroeder, Jordan

403,64 DKK

Waging Cyber War

Waging Cyber War

Oakley, Jacob G.

288,10 DKK

Zero Trust Networks

Zero Trust Networks

Barth, Doug

359,43 DKK

Cloud Attack Vectors

Cloud Attack Vectors

Hills, Christopher

473,39 DKK

Complete Guide to Burp Suite

Complete Guide to Burp Suite

Rahalkar, Sagar

310,39 DKK

Container Security

Container Security

Rice, Liz

310,39 DKK

Cloud Attack Vectors

Cloud Attack Vectors

Hills, Christopher

473,39 DKK

Big Breaches

Big Breaches

Elbayadi, Moudy

238,03 DKK

Designing a HIPAA-Compliant Security Operations Center

Designing a HIPAA-Compliant Security Operations Center

Thompson, Eric C.

403,64 DKK

Firewalls Don't Stop Dragons

Firewalls Don't Stop Dragons

Parker, Carey

288,10 DKK

Modern Data Protection

Modern Data Protection

Preston, W. Curtis

359,43 DKK

Protective Security

Protective Security

Seaman, Jim

403,64 DKK

Cybersecurity Incident Response

Cybersecurity Incident Response

Thompson, Eric C.

473,39 DKK

Certified Ethical Hacker (CEH) Foundation Guide

Certified Ethical Hacker (CEH) Foundation Guide

Rahalkar, Sagar Ajay

265,81 DKK