Computing and Information Technology > Computer security

Vis mig kun

Stealing the Network: How to Own an Identity

Stealing the Network: How to Own an Identity

Hatch, Brian

202,21 DKK

How to Cheat at Securing a Wireless Network

How to Cheat at Securing a Wireless Network

Barken, Lee

196,23 DKK

Security in Computing

Security in Computing

Margulies, Jonathan

692,63 DKK

Practical Guide to Trusted Computing , A

Practical Guide to Trusted Computing , A

Doorn, Leendert Van

165,78 DKK

Firewalls

Firewalls

Ellis, Scott

473,39 DKK

Advanced Persistent Threat Hacking

Advanced Persistent Threat Hacking

Wrightson, Tyler

343,95 DKK

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Cross, Michael

253,01 DKK

Adversarial Machine Learning

Adversarial Machine Learning

Zhou, Wanlei

1313,81 DKK

Adversarial Machine Learning

Adversarial Machine Learning

Zhou, Wanlei

1313,81 DKK

How to Break Web Software

How to Break Web Software

Whittaker, James A.

184,80 DKK

CERT C Secure Coding Standard

CERT C Secure Coding Standard

Seacord, Robert C.

317,82 DKK

Enterprise Software Security

Enterprise Software Security

Ph.D., Diana L. Burley

150,55 DKK

Building Secure Software

Building Secure Software

McGraw, Gary R.

181,00 DKK

Enterprise Software Security

Enterprise Software Security

Ph.D., Diana L. Burley

202,21 DKK

Secure Programming with Static Analysis

Secure Programming with Static Analysis

West, Jacob

265,81 DKK

Managing the Human Factor in Information Security

Managing the Human Factor in Information Security

Lacey, David

288,10 DKK

Trust Management

Trust Management

Marsh, Stephen

875,33 DKK

SSH, The Secure Shell: The Definitive Guide

SSH, The Secure Shell: The Definitive Guide

Byrnes, Robert G.

230,54 DKK

Computer Forensics For Dummies

Computer Forensics For Dummies

Anzaldua, Reynaldo

165,78 DKK

Security Warrior

Security Warrior

Chuvakin, Anton

230,54 DKK

Security and Usability

Security and Usability

Garfinkel, Simson

238,03 DKK

Digital Identity

Digital Identity

Windley, Phillip J.

181,00 DKK

e-Discovery For Dummies

e-Discovery For Dummies

Redpath, Ian

165,78 DKK

Security and Usability

Security and Usability

Garfinkel, Simson

253,01 DKK

Fifth World Conference on Information Security Education

Fifth World Conference on Information Security Education

Dodge, Ronald

436,85 DKK

Myths of Security

Myths of Security

Viega, John

146,74 DKK

Security Warrior

Security Warrior

Chuvakin, Anton

230,54 DKK

Snort Cookbook

Snort Cookbook

Babbin, Jacob

196,23 DKK

Introduction to the Cyber Ranges

Introduction to the Cyber Ranges

Ahmad, Shabeer

948,41 DKK

Security Monitoring

Security Monitoring

Nystrom, Martin

223,05 DKK