Computing and Information Technology > Computer security

Vis mig kun

Cisco PIX Firewalls

Cisco PIX Firewalls

Khan, Umer

253,01 DKK

Essential Skills for Hackers

Essential Skills for Hackers

Dalziel, Henry

265,81 DKK

Juniper(r) Networks Secure Access SSL VPN Configuration Guide

Juniper(r) Networks Secure Access SSL VPN Configuration Guide

Wyler, Neil R.

366,80 DKK

Analyzing Computer Security

Analyzing Computer Security

Pfleeger, Shari Lawrence

403,64 DKK

Computer and Information Security Handbook

Computer and Information Security Handbook

Vacca, John R.

25,00 DKK

Wireshark Field Guide

Wireshark Field Guide

Shimonski, Robert

209,76 DKK

Thinking Security

Thinking Security

Bellovin, Steven M.

181,00 DKK

Check Point Next Generation with Application Intelligence Security Administration

Check Point Next Generation with Application Intelligence Security Administration

Syngress

302,96 DKK

Research Methods for Cyber Security

Research Methods for Cyber Security

Manz, David O.

802,25 DKK

Netcat Power Tools

Netcat Power Tools

Kanclirz, Jan

343,95 DKK

Configuring Symantec AntiVirus Enterprise Edition

Configuring Symantec AntiVirus Enterprise Edition

Syngress

302,96 DKK

DNS Security

DNS Security

Stowe, Geoffrey

329,95 DKK

InfoSec Career Hacking: Sell Your Skillz, Not Your Soul

InfoSec Career Hacking: Sell Your Skillz, Not Your Soul

Brindley, Ed

202,21 DKK

Stealing the Network: How to Own an Identity

Stealing the Network: How to Own an Identity

Hatch, Brian

202,21 DKK

How to Cheat at Securing a Wireless Network

How to Cheat at Securing a Wireless Network

Barken, Lee

196,23 DKK

Security in Computing

Security in Computing

Margulies, Jonathan

692,63 DKK

Practical Guide to Trusted Computing , A

Practical Guide to Trusted Computing , A

Doorn, Leendert Van

165,78 DKK

Firewalls

Firewalls

Ellis, Scott

473,39 DKK

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Cross, Michael

253,01 DKK

Adversarial Machine Learning

Adversarial Machine Learning

Zhou, Wanlei

1313,81 DKK

Adversarial Machine Learning

Adversarial Machine Learning

Zhou, Wanlei

1313,81 DKK

How to Break Web Software

How to Break Web Software

Whittaker, James A.

184,80 DKK

CERT C Secure Coding Standard

CERT C Secure Coding Standard

Seacord, Robert C.

317,82 DKK

Enterprise Software Security

Enterprise Software Security

Ph.D., Diana L. Burley

150,55 DKK

Building Secure Software

Building Secure Software

McGraw, Gary R.

181,00 DKK

Enterprise Software Security

Enterprise Software Security

Ph.D., Diana L. Burley

202,21 DKK

Secure Programming with Static Analysis

Secure Programming with Static Analysis

West, Jacob

265,81 DKK

Managing the Human Factor in Information Security

Managing the Human Factor in Information Security

Lacey, David

288,10 DKK

Trust Management

Trust Management

Marsh, Stephen

875,33 DKK

SSH, The Secure Shell: The Definitive Guide

SSH, The Secure Shell: The Definitive Guide

Byrnes, Robert G.

230,54 DKK