Computing and Information Technology > Computer security

Vis mig kun

IT Regulatory and Standards Compliance Handbook

IT Regulatory and Standards Compliance Handbook

Wright, Craig S.

436,85 DKK

Nmap in the Enterprise

Nmap in the Enterprise

Pinkard, Becky

366,80 DKK

Hack the Stack

Hack the Stack

Ries, Chris

253,01 DKK

RFID Security

RFID Security

Lanthem, Chris

253,01 DKK

Nessus Network Auditing

Nessus Network Auditing

Rogers, Russ

288,10 DKK

CERT C Secure Coding Standard, The

CERT C Secure Coding Standard, The

Seacord, Robert C.

177,19 DKK

Network and System Security

Network and System Security

Vacca, John R.

359,43 DKK

Pervasive Computing

Pervasive Computing

Xhafa, Fatos

875,33 DKK

InfoSecurity 2008 Threat Analysis

InfoSecurity 2008 Threat Analysis

Gregg, Michael

302,96 DKK

Information Assurance

Information Assurance

Joshi, James

509,93 DKK

Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft

Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft

Ring, Sandra

181,00 DKK

Botnets

Botnets

Binkley, James R.

253,01 DKK

Measuring and Managing Information Risk

Measuring and Managing Information Risk

Jones, Jack

329,95 DKK

How to Cheat at Configuring Open Source Security Tools

How to Cheat at Configuring Open Source Security Tools

Marty, Raffael

253,01 DKK

Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services

Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services

Craft, Melissa

253,01 DKK

Implementing Database Security and Auditing

Implementing Database Security and Auditing

Natan, Ron Ben

473,39 DKK

AVIEN Malware Defense Guide for the Enterprise

AVIEN Malware Defense Guide for the Enterprise

Harley, David

366,80 DKK

Emerging Trends in ICT Security

Emerging Trends in ICT Security

Arabnia, Hamid R

729,17 DKK

Research Methods for Cyber Security

Research Methods for Cyber Security

Manz, David O.

802,25 DKK

Cyber Crime and Cyber Terrorism Investigator's Handbook

Cyber Crime and Cyber Terrorism Investigator's Handbook

Bosco, Francesca

329,95 DKK

Handbook on Securing Cyber-Physical Critical Infrastructure

Handbook on Securing Cyber-Physical Critical Infrastructure

Zhang, Nan

583,01 DKK

Professional Penetration Testing

Professional Penetration Testing

Wilhelm, Thomas

25,00 DKK

Practical VoIP Security

Practical VoIP Security

CCS, Thomas Porter CISSP CCNP CCDA

238,03 DKK

Hacking the Code

Hacking the Code

Burnett, Mark

260,50 DKK

CERT Guide to Insider Threats

CERT Guide to Insider Threats

Trzeciak, Randall F.

302,96 DKK

Secure Your Network for Free

Secure Your Network for Free

Seagren, Eric

202,21 DKK

MCSA/MCSE Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (Exam 70-291)

MCSA/MCSE Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (Exam 70-291)

Syngress

302,96 DKK

Computer Security

Computer Security

Bishop, Matt

583,01 DKK

Configuring Check Point NGX VPN-1/Firewall-1

Configuring Check Point NGX VPN-1/Firewall-1

Desmeules, Simon

253,01 DKK

Snort Intrusion Detection and Prevention Toolkit

Snort Intrusion Detection and Prevention Toolkit

Baker, Andrew

238,03 DKK