Computing and Information Technology > Computer security

Vis mig kun

Google Hacking for Penetration Testers

Google Hacking for Penetration Testers

Brown, Justin

25,00 DKK

Practical Deployment of Cisco Identity Services Engine (ISE)

Practical Deployment of Cisco Identity Services Engine (ISE)

Wood, Jeremy

473,39 DKK

Cyber Crime and Cyber Terrorism Investigator's Handbook

Cyber Crime and Cyber Terrorism Investigator's Handbook

Bosco, Francesca

329,95 DKK

Social Engineering Penetration Testing

Social Engineering Penetration Testing

Ackroyd, Richard

329,95 DKK

Microsoft Forefront Security Administration Guide

Microsoft Forefront Security Administration Guide

Varsalone, Jesse

302,96 DKK

How to Cheat at IIS 7 Server Administration

How to Cheat at IIS 7 Server Administration

Adams, Chris

253,01 DKK

Blockchain for Business

Blockchain for Business

Gaur, Nitin

161,96 DKK

How to Cheat at VoIP Security

How to Cheat at VoIP Security

Gough, Michael

253,01 DKK

Netcat Power Tools

Netcat Power Tools

Kanclirz, Jan

343,95 DKK

Computer Security

Computer Security

Bishop, Matt

583,01 DKK

Web Application Vulnerabilities

Web Application Vulnerabilities

Palmer, Steven

366,80 DKK

Phishing Exposed

Phishing Exposed

James, Lance

253,01 DKK

Cyber Security Engineering

Cyber Security Engineering

Woody, Carol

181,00 DKK

Network Security Evaluation Using the NSA IEM

Network Security Evaluation Using the NSA IEM

Cunningham, Bryan

302,96 DKK

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies

Hernandez, Steven

436,85 DKK

Mobile Security and Privacy

Mobile Security and Privacy

Choo, Raymond

656,09 DKK

Information Security Handbook

Information Security Handbook

Death, Darren

245,52 DKK

Digital Archaeology

Digital Archaeology

Graves, Michael W

280,67 DKK

Snort Intrusion Detection and Prevention Toolkit

Snort Intrusion Detection and Prevention Toolkit

Baker, Andrew

238,03 DKK

Cyber Crime Investigations

Cyber Crime Investigations

O'Shea, Kevin

343,95 DKK

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

Maynor, David

302,96 DKK

Best Damn Cisco Internetworking Book Period

Best Damn Cisco Internetworking Book Period

Syngress

310,39 DKK

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

Foster, James C

253,01 DKK

Computer Forensics and Digital Investigation with EnCase Forensic v7

Computer Forensics and Digital Investigation with EnCase Forensic v7

Widup, Suzanne

343,95 DKK

CERT Guide to Insider Threats

CERT Guide to Insider Threats

Trzeciak, Randall F.

230,54 DKK

How to Cheat at VoIP Security

How to Cheat at VoIP Security

Gough, Michael

253,01 DKK

Network and System Security

Network and System Security

Vacca, John R.

359,43 DKK

Dictionary of Information Security

Dictionary of Information Security

Slade, Robert

158,16 DKK

How to Cheat at Configuring ISA Server 2004

How to Cheat at Configuring ISA Server 2004

Shinder, Thomas W

181,00 DKK

Secure Your Network for Free

Secure Your Network for Free

Seagren, Eric

202,21 DKK