Computing and Information Technology > Computer security

Vis mig kun

Social Engineering in IT Security: Tools, Tactics, and Techniques

Social Engineering in IT Security: Tools, Tactics, and Techniques

Conheady, Sharon

280,67 DKK

How to Cheat at Designing Security for a Windows Server 2003 Network

How to Cheat at Designing Security for a Windows Server 2003 Network

Ruston, Chris

202,21 DKK

Art of Software Security Assessment, The

Art of Software Security Assessment, The

Schuh, Justin

348,37 DKK

Online Security for the Business Traveler

Online Security for the Business Traveler

Gonzalez, Deborah

119,34 DKK

How to Cheat at Securing SQL Server 2005

How to Cheat at Securing SQL Server 2005

Horninger, Mark

253,01 DKK

Social Engineering in IT Security: Tools, Tactics, and Techniques

Social Engineering in IT Security: Tools, Tactics, and Techniques

Conheady, Sharon

280,67 DKK

DNS Security

DNS Security

Stowe, Geoffrey

329,95 DKK

How to Cheat at Managing Microsoft Operations Manager 2005

How to Cheat at Managing Microsoft Operations Manager 2005

Piltzecker, Anthony

196,23 DKK

How to Cheat at Administering Office Communications Server 2007

How to Cheat at Administering Office Communications Server 2007

Piltzecker, Anthony

253,01 DKK

Social Engineering Penetration Testing

Social Engineering Penetration Testing

Ackroyd, Richard

329,95 DKK

Incident Response & Computer Forensics, Third Edition

Incident Response & Computer Forensics, Third Edition

Mandia, Kevin

436,85 DKK

Managing Catastrophic Loss of Sensitive Data

Managing Catastrophic Loss of Sensitive Data

Photopoulos, Constantine

366,80 DKK

Designing A Wireless Network

Designing A Wireless Network

Syngress

238,03 DKK

Cisco PIX Firewalls

Cisco PIX Firewalls

Khan, Umer

253,01 DKK

Essential Skills for Hackers

Essential Skills for Hackers

Dalziel, Henry

265,81 DKK

Juniper(r) Networks Secure Access SSL VPN Configuration Guide

Juniper(r) Networks Secure Access SSL VPN Configuration Guide

Wyler, Neil R.

366,80 DKK

Analyzing Computer Security

Analyzing Computer Security

Pfleeger, Shari Lawrence

403,64 DKK

Computer and Information Security Handbook

Computer and Information Security Handbook

Vacca, John R.

25,00 DKK

Wireshark Field Guide

Wireshark Field Guide

Shimonski, Robert

209,76 DKK

Advanced Persistent Threat Hacking

Advanced Persistent Threat Hacking

Wrightson, Tyler

343,95 DKK

Thinking Security

Thinking Security

Bellovin, Steven M.

181,00 DKK

Computer Forensics and Digital Investigation with EnCase Forensic v7

Computer Forensics and Digital Investigation with EnCase Forensic v7

Widup, Suzanne

343,95 DKK

Mobile Application Security

Mobile Application Security

Thiel, David

343,95 DKK

Check Point Next Generation with Application Intelligence Security Administration

Check Point Next Generation with Application Intelligence Security Administration

Syngress

302,96 DKK

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies

Hernandez, Steven

436,85 DKK

Research Methods for Cyber Security

Research Methods for Cyber Security

Manz, David O.

802,25 DKK

Netcat Power Tools

Netcat Power Tools

Kanclirz, Jan

343,95 DKK

Configuring Symantec AntiVirus Enterprise Edition

Configuring Symantec AntiVirus Enterprise Edition

Syngress

302,96 DKK

DNS Security

DNS Security

Stowe, Geoffrey

329,95 DKK

InfoSec Career Hacking: Sell Your Skillz, Not Your Soul

InfoSec Career Hacking: Sell Your Skillz, Not Your Soul

Brindley, Ed

202,21 DKK