Computing and Information Technology > Computer security

Vis mig kun

Sniffer Pro Network Optimization & Troubleshooting Handbook

Sniffer Pro Network Optimization & Troubleshooting Handbook

Syngress

253,01 DKK

Configuring Juniper Networks NetScreen and SSG Firewalls

Configuring Juniper Networks NetScreen and SSG Firewalls

Lorenzin, Lisa

238,03 DKK

Online Security for the Business Traveler

Online Security for the Business Traveler

Gonzalez, Deborah

119,34 DKK

e-Discovery For Dummies

e-Discovery For Dummies

Redpath, Ian

165,78 DKK

Computer Forensics For Dummies

Computer Forensics For Dummies

Anzaldua, Reynaldo

165,78 DKK

Phishing Detection Using Content-Based Image Classification

Phishing Detection Using Content-Based Image Classification

Das, Rik

177,19 DKK

Securing IoT in Industry 4.0 Applications with Blockchain

Securing IoT in Industry 4.0 Applications with Blockchain

Devi, T.

436,85 DKK

Digital Forensics Explained

Digital Forensics Explained

Gogolin, Greg

473,39 DKK

Introduction to the Cyber Ranges

Introduction to the Cyber Ranges

Ahmad, Shabeer

948,41 DKK

Information Security Handbook

Information Security Handbook

Tavares, Joao Manuel R.S.

436,85 DKK

Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems

Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems

Uribeetxeberria, Roberto

509,93 DKK

Myths of Security

Myths of Security

Viega, John

154,35 DKK

Cross-Site Scripting Attacks

Cross-Site Scripting Attacks

Chaudhary, Pooja

177,19 DKK

Security Awareness Design in the New Normal Age

Security Awareness Design in the New Normal Age

Goucher, Wendy F.

546,47 DKK

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

Fair, Ted

202,21 DKK

Internet Security

Internet Security

Ellis, Juanita

403,64 DKK

Professional Penetration Testing

Professional Penetration Testing

Wilhelm, Thomas

473,39 DKK

Intruder Alarms

Intruder Alarms

Honey, Gerard

260,50 DKK

Thinking Security

Thinking Security

Bellovin, Steven M.

135,33 DKK

Stealing The Network

Stealing The Network

Syngress

253,01 DKK

Professional Penetration Testing

Professional Penetration Testing

Wilhelm, Thomas

473,39 DKK

Best Damn Firewall Book Period

Best Damn Firewall Book Period

Shinder, Thomas W

343,95 DKK

Zero-Day Exploit

Zero-Day Exploit

Shein, Rob

253,01 DKK

Malware Forensics

Malware Forensics

Aquilina, James M.

403,64 DKK

Lossless Information Hiding in Images

Lossless Information Hiding in Images

Guo, Shi-Ze

473,39 DKK

Cyber-Physical Attacks

Cyber-Physical Attacks

Loukas, George

329,95 DKK

Configuring Juniper Networks NetScreen and SSG Firewalls

Configuring Juniper Networks NetScreen and SSG Firewalls

Lorenzin, Lisa

238,03 DKK

Open Source Fuzzing Tools

Open Source Fuzzing Tools

Evron, Gadi

366,80 DKK

How to Cheat at Securing SQL Server 2005

How to Cheat at Securing SQL Server 2005

Horninger, Mark

253,01 DKK

Lossless Information Hiding in Images

Lossless Information Hiding in Images

Guo, Shi-Ze

473,39 DKK