Computing and Information Technology > Computer security

Vis mig kun

Stealing the Network

Stealing the Network

Russell, Ryan

253,01 DKK

Blockchain for Business

Blockchain for Business

Gaur, Nitin

161,96 DKK

Cisco Security Specialists Guide to PIX Firewall

Cisco Security Specialists Guide to PIX Firewall

Syngress

302,96 DKK

Social Engineering

Social Engineering

Erbschloe, Michael

403,64 DKK

Network Performance and Security

Network Performance and Security

Chapman, Chris

403,64 DKK

Enemy at the Water Cooler

Enemy at the Water Cooler

Contos, Brian T

260,50 DKK

Building Blockchain Apps

Building Blockchain Apps

Yuan, Michael Juntao

223,05 DKK

Next Generation SSH2 Implementation

Next Generation SSH2 Implementation

Liu, Dale

223,05 DKK

Holistic Approach to Quantum Cryptography in Cyber Security

Holistic Approach to Quantum Cryptography in Cyber Security

Singh, Anuj Kumar

436,85 DKK

Pervasive Computing

Pervasive Computing

Xhafa, Fatos

875,33 DKK

Managing Cisco Network Security

Managing Cisco Network Security

Syngress

302,96 DKK

Network Performance and Security

Network Performance and Security

Chapman, Chris

403,64 DKK

Semantic Control for the Cybersecurity Domain

Semantic Control for the Cybersecurity Domain

Lanza, Claudia

436,85 DKK

Host Integrity Monitoring Using Osiris and Samhain

Host Integrity Monitoring Using Osiris and Samhain

Wotring, Brian

223,05 DKK

Digital Archaeology

Digital Archaeology

Graves, Michael W

366,80 DKK

Handbook of System Safety and Security

Handbook of System Safety and Security

Griffor, Edward

1313,81 DKK

Targeted Cyber Attacks

Targeted Cyber Attacks

Enbody, Richard

205,98 DKK

Security Leader Insights for Information Protection

Security Leader Insights for Information Protection

Fahy, Bob

173,39 DKK

SAP Security Configuration and Deployment

SAP Security Configuration and Deployment

Hirao, Joey

436,85 DKK

Dr. Tom Shinder's ISA Server 2006 Migration Guide

Dr. Tom Shinder's ISA Server 2006 Migration Guide

Shinder, Thomas W

253,01 DKK

Nessus Network Auditing

Nessus Network Auditing

Rogers, Russ

288,10 DKK

Application of Big Data for National Security

Application of Big Data for National Security

Bayerl, Petra Saskia

473,39 DKK

Network Security: Know It All

Network Security: Know It All

Joshi, James

546,47 DKK

Information Protection Playbook

Information Protection Playbook

Koppel, Lorna

473,39 DKK

Intruder Alarms

Intruder Alarms

Honey, Gerard

260,50 DKK

Stealing The Network

Stealing The Network

Syngress

253,01 DKK

Malware Forensics

Malware Forensics

Aquilina, James M.

403,64 DKK

Nagios 3 Enterprise Network Monitoring

Nagios 3 Enterprise Network Monitoring

Strand, John

302,96 DKK

Computer and Information Security Handbook

Computer and Information Security Handbook

Vacca, John R.

25,00 DKK

WarDriving and Wireless Penetration Testing

WarDriving and Wireless Penetration Testing

Baker, Brian

253,01 DKK