Computing and Information Technology > Computer security

Vis mig kun

Network Security Assessment

Network Security Assessment

McNab, Chris

273,24 DKK

Pro Google Cloud Automation

Pro Google Cloud Automation

Pandey, Piyush

436,85 DKK

Architecture of Privacy

Architecture of Privacy

Lerner, Elissa

166,54 DKK

CompTIA Security+ Certification Study Guide

CompTIA Security+ Certification Study Guide

Sheikh, Ahmed F.

473,39 DKK

Open Source Intelligence Methods and Tools

Open Source Intelligence Methods and Tools

Hijazi, Rami

403,64 DKK

Authentication and Access Control

Authentication and Access Control

Boonkrong, Sirapat

473,39 DKK

Building a HIPAA-Compliant Cybersecurity Program

Building a HIPAA-Compliant Cybersecurity Program

Thompson, Eric C.

473,39 DKK

Certified Ethical Hacker (CEH) Preparation Guide

Certified Ethical Hacker (CEH) Preparation Guide

Sheikh, Ahmed

473,39 DKK

Building an Effective Security Program

Building an Effective Security Program

Siegel, Stanley

403,64 DKK

Achieving and Sustaining Secured Business Operations

Achieving and Sustaining Secured Business Operations

Kumar, Dinesh

265,81 DKK

Cyber Crime and the Victimization of Women: Laws, Rights and Regulations

Cyber Crime and the Victimization of Women: Laws, Rights and Regulations

K.

2190,77 DKK

What's Cypersecurity all about?

What's Cypersecurity all about?

Robin Sharp

120,93 DKK