Computing and Information Technology > Computer security

Vis mig kun

How to Cheat at VoIP Security

How to Cheat at VoIP Security

Gough, Michael

253,01 DKK

Netcat Power Tools

Netcat Power Tools

Kanclirz, Jan

343,95 DKK

Computer Security

Computer Security

Bishop, Matt

583,01 DKK

Web Application Vulnerabilities

Web Application Vulnerabilities

Palmer, Steven

366,80 DKK

Phishing Exposed

Phishing Exposed

James, Lance

253,01 DKK

Cyber Security Engineering

Cyber Security Engineering

Woody, Carol

181,00 DKK

Network Security Evaluation Using the NSA IEM

Network Security Evaluation Using the NSA IEM

Cunningham, Bryan

302,96 DKK

Mobile Security and Privacy

Mobile Security and Privacy

Choo, Raymond

656,09 DKK

Digital Archaeology

Digital Archaeology

Graves, Michael W

280,67 DKK

Snort Intrusion Detection and Prevention Toolkit

Snort Intrusion Detection and Prevention Toolkit

Baker, Andrew

238,03 DKK

Cyber Crime Investigations

Cyber Crime Investigations

O'Shea, Kevin

343,95 DKK

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

Maynor, David

302,96 DKK

Best Damn Cisco Internetworking Book Period

Best Damn Cisco Internetworking Book Period

Syngress

310,39 DKK

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

Foster, James C

253,01 DKK

CERT Guide to Insider Threats

CERT Guide to Insider Threats

Trzeciak, Randall F.

230,54 DKK

How to Cheat at VoIP Security

How to Cheat at VoIP Security

Gough, Michael

253,01 DKK

Network and System Security

Network and System Security

Vacca, John R.

359,43 DKK

Dictionary of Information Security

Dictionary of Information Security

Slade, Robert

158,16 DKK

How to Cheat at Configuring ISA Server 2004

How to Cheat at Configuring ISA Server 2004

Shinder, Thomas W

181,00 DKK

Secure Your Network for Free

Secure Your Network for Free

Seagren, Eric

202,21 DKK

How to Cheat at Designing Security for a Windows Server 2003 Network

How to Cheat at Designing Security for a Windows Server 2003 Network

Ruston, Chris

202,21 DKK

Art of Software Security Assessment, The

Art of Software Security Assessment, The

Schuh, Justin

348,37 DKK

Online Security for the Business Traveler

Online Security for the Business Traveler

Gonzalez, Deborah

119,34 DKK

How to Cheat at Securing SQL Server 2005

How to Cheat at Securing SQL Server 2005

Horninger, Mark

253,01 DKK

DNS Security

DNS Security

Stowe, Geoffrey

329,95 DKK

How to Cheat at Managing Microsoft Operations Manager 2005

How to Cheat at Managing Microsoft Operations Manager 2005

Piltzecker, Anthony

196,23 DKK

How to Cheat at Administering Office Communications Server 2007

How to Cheat at Administering Office Communications Server 2007

Piltzecker, Anthony

253,01 DKK

Social Engineering Penetration Testing

Social Engineering Penetration Testing

Ackroyd, Richard

329,95 DKK

Managing Catastrophic Loss of Sensitive Data

Managing Catastrophic Loss of Sensitive Data

Photopoulos, Constantine

366,80 DKK

Designing A Wireless Network

Designing A Wireless Network

Syngress

238,03 DKK