Computing and Information Technology > Computer security

Vis mig kun

Computer and Information Security Handbook

Computer and Information Security Handbook

Vacca, John R.

25,00 DKK

Essential Skills for Hackers

Essential Skills for Hackers

Dalziel, Henry

265,81 DKK

History of Information Security

History of Information Security

Bergstra, Jan

2190,77 DKK

Emerging Trends in ICT Security

Emerging Trends in ICT Security

Arabnia, Hamid R

729,17 DKK

Securing IM and P2P Applications for the Enterprise

Securing IM and P2P Applications for the Enterprise

Piccard, Paul

253,01 DKK

HP NonStop Server Security

HP NonStop Server Security

Corp, XYPRO Technology XYPRO Technology

802,25 DKK

Wireshark Field Guide

Wireshark Field Guide

Shimonski, Robert

209,76 DKK

Kismet Hacking

Kismet Hacking

Haines, Brad

280,67 DKK

Professional Penetration Testing

Professional Penetration Testing

Wilhelm, Thomas

25,00 DKK

Configuring NetScreen Firewalls

Configuring NetScreen Firewalls

Cameron, Rob

253,01 DKK

Applied Network Security Monitoring

Applied Network Security Monitoring

Smith, Jason

295,53 DKK

Cyber Attacks

Cyber Attacks

Amoroso, Edward

366,80 DKK

How to Cheat at Securing Your Network

How to Cheat at Securing Your Network

Dubrawsky, Ido

253,01 DKK

WarDriving: Drive, Detect, Defend

WarDriving: Drive, Detect, Defend

Hurley, Chris

253,01 DKK

How to Cheat at Configuring Exchange Server 2007

How to Cheat at Configuring Exchange Server 2007

Walther, Henrik

202,21 DKK

How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure

How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure

Barber, Brian

202,21 DKK

Google Hacking for Penetration Testers

Google Hacking for Penetration Testers

Brown, Justin

25,00 DKK

Combating Spyware in the Enterprise

Combating Spyware in the Enterprise

Piccard, Paul

253,01 DKK

Mobile Security and Privacy

Mobile Security and Privacy

Choo, Raymond

656,09 DKK

Applied Network Security Monitoring

Applied Network Security Monitoring

Smith, Jason

295,53 DKK

Microsoft Windows Security Fundamentals

Microsoft Windows Security Fundamentals

Grillenmeier, Guido

546,47 DKK

Rick Gallahers MPLS Training Guide

Rick Gallahers MPLS Training Guide

Syngress

302,96 DKK

Cyber Attacks

Cyber Attacks

Amoroso, Edward

366,80 DKK

Google Hacking for Penetration Testers

Google Hacking for Penetration Testers

Brown, Justin

25,00 DKK

Practical Deployment of Cisco Identity Services Engine (ISE)

Practical Deployment of Cisco Identity Services Engine (ISE)

Wood, Jeremy

473,39 DKK

Cyber Crime and Cyber Terrorism Investigator's Handbook

Cyber Crime and Cyber Terrorism Investigator's Handbook

Bosco, Francesca

329,95 DKK

Social Engineering Penetration Testing

Social Engineering Penetration Testing

Ackroyd, Richard

329,95 DKK

Microsoft Forefront Security Administration Guide

Microsoft Forefront Security Administration Guide

Varsalone, Jesse

302,96 DKK

How to Cheat at IIS 7 Server Administration

How to Cheat at IIS 7 Server Administration

Adams, Chris

253,01 DKK

Blockchain for Business

Blockchain for Business

Gaur, Nitin

161,96 DKK