Computing and Information Technology > Computer security

Vis mig kun

Stealing the Network

Stealing the Network

Craig, Tom

260,50 DKK

Confidential Information Sources

Confidential Information Sources

Carroll, John M.

473,39 DKK

How to Cheat at Deploying and Securing RFID

How to Cheat at Deploying and Securing RFID

Sanghera, Paul

253,01 DKK

Perfect Password

Perfect Password

Burnett, Mark

127,71 DKK

Targeted Cyber Attacks

Targeted Cyber Attacks

Enbody, Richard

205,98 DKK

Cyber Adversary Characterization

Cyber Adversary Characterization

Stroz, Ed

253,01 DKK

Data Networks

Data Networks

Kenyon, Tony

583,01 DKK

XSS Attacks

XSS Attacks

Petkov, Petko D.

366,80 DKK

Managing Cisco Network Security

Managing Cisco Network Security

Syngress

302,96 DKK

Social Engineering

Social Engineering

Erbschloe, Michael

403,64 DKK

Security + Study Guide and DVD Training System

Security + Study Guide and DVD Training System

Syngress

295,53 DKK

Hack the Stack

Hack the Stack

Ries, Chris

253,01 DKK

Information Protection Playbook

Information Protection Playbook

Koppel, Lorna

473,39 DKK

Secure Programming with Static Analysis

Secure Programming with Static Analysis

West, Jacob

202,21 DKK

OSSEC Host-Based Intrusion Detection Guide

OSSEC Host-Based Intrusion Detection Guide

Bray, Rory

366,80 DKK

Surreptitious Software

Surreptitious Software

Collberg, Christian

223,05 DKK

Configuring SonicWALL Firewalls

Configuring SonicWALL Firewalls

Bendell, Dan

253,01 DKK

Syngress Force Emerging Threat Analysis

Syngress Force Emerging Threat Analysis

Graham, Robert

253,01 DKK

Securing HP NonStop Servers in an Open Systems World

Securing HP NonStop Servers in an Open Systems World

Corp, XYPRO Technology XYPRO Technology

802,25 DKK

Disappearing Cryptography

Disappearing Cryptography

Wayner, Peter

403,64 DKK

Application of Big Data for National Security

Application of Big Data for National Security

Bayerl, Petra Saskia

473,39 DKK

Linksys WRT54G Ultimate Hacking

Linksys WRT54G Ultimate Hacking

Pesce, Larry

202,21 DKK

Digital Forensics Explained

Digital Forensics Explained

Gogolin, Greg

473,39 DKK

Handbook of System Safety and Security

Handbook of System Safety and Security

Griffor, Edward

1313,81 DKK

Cyber Security Engineering

Cyber Security Engineering

Woody, Carol

230,54 DKK

How to Cheat at Securing Linux

How to Cheat at Securing Linux

Stanger, James

253,01 DKK

Security Leader Insights for Information Protection

Security Leader Insights for Information Protection

Fahy, Bob

173,39 DKK

SAP Security Configuration and Deployment

SAP Security Configuration and Deployment

Hirao, Joey

436,85 DKK

Analyzing Computer Security

Analyzing Computer Security

Pfleeger, Shari Lawrence

509,93 DKK

Disappearing Cryptography

Disappearing Cryptography

Wayner, Peter

403,64 DKK