Computing and Information Technology > Computer security

Vis mig kun

Cyber Crime Investigations

Cyber Crime Investigations

O'Shea, Kevin

343,95 DKK

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

Maynor, David

302,96 DKK

Implementing Homeland Security for Enterprise IT

Implementing Homeland Security for Enterprise IT

Erbschloe, Michael

403,64 DKK

Network Security

Network Security

Harrington, Jan L.

343,95 DKK

Check Point NGX R65 Security Administration

Check Point NGX R65 Security Administration

Bonnell, Ralph

343,95 DKK

Security and Privacy Trends in Cloud Computing and Big Data

Security and Privacy Trends in Cloud Computing and Big Data

Tayyaba, Shahzadi

436,85 DKK

Security and Privacy Trends in Cloud Computing and Big Data

Security and Privacy Trends in Cloud Computing and Big Data

Tayyaba, Shahzadi

436,85 DKK

Computer System and Network Security

Computer System and Network Security

Pooch, Udo W.

1313,81 DKK

Data And Computer Security

Data And Computer Security

Shain, Michael

260,50 DKK

Hacking and Securing iOS Applications

Hacking and Securing iOS Applications

Zdziarski, Jonathan

123,90 DKK

Hacking and Securing iOS Applications

Hacking and Securing iOS Applications

Zdziarski, Jonathan

131,51 DKK

Web Security, Privacy & Commerce

Web Security, Privacy & Commerce

Spafford, Gene

253,01 DKK

CIO's Guide to Information Security Incident Management

CIO's Guide to Information Security Incident Management

Goucher, Wendy Fiona

403,64 DKK

Pro Google Cloud Automation

Pro Google Cloud Automation

Pandey, Piyush

436,85 DKK

70 Tips and Tricks for Mastering the CISSP Exam

70 Tips and Tricks for Mastering the CISSP Exam

Danturthi, R. Sarma

473,39 DKK

Phishing and Communication Channels

Phishing and Communication Channels

Sonowal, Gunikhan

403,64 DKK

Network Security Tools

Network Security Tools

Clarke, Justin

181,00 DKK

Network Security Tools

Network Security Tools

Clarke, Justin

181,00 DKK

Privileged Attack Vectors

Privileged Attack Vectors

Haber, Morey J.

509,93 DKK

Privileged Attack Vectors

Privileged Attack Vectors

Haber, Morey J.

509,93 DKK

70 Tips and Tricks for Mastering the CISSP Exam

70 Tips and Tricks for Mastering the CISSP Exam

Danturthi, R. Sarma

473,39 DKK

NTP Security

NTP Security

Liska, Allan

265,81 DKK

Digital Privacy and Security Using Windows

Digital Privacy and Security Using Windows

Hijazi, Rami

509,93 DKK

Agile Application Security

Agile Application Security

Bird, Jim

310,39 DKK

Ransomware Revealed

Ransomware Revealed

Hassan, Nihad A.

288,10 DKK

Cyber Operations

Cyber Operations

O'Leary, Mike

619,55 DKK

Jump-start Your SOC Analyst Career

Jump-start Your SOC Analyst Career

Rodrick, Jarrett

288,10 DKK

Cyber Threat Intelligence

Cyber Threat Intelligence

Roberts, Aaron

403,64 DKK

Building a HIPAA-Compliant Cybersecurity Program

Building a HIPAA-Compliant Cybersecurity Program

Thompson, Eric C.

473,39 DKK

Designing a HIPAA-Compliant Security Operations Center

Designing a HIPAA-Compliant Security Operations Center

Thompson, Eric C.

403,64 DKK