Syngress

Vis mig kun

Cyber Security Awareness for Accountants and CPAs

Cyber Security Awareness for Accountants and CPAs

Willson, David

265,81 DKK

Cyber Security Awareness for Lawyers

Cyber Security Awareness for Lawyers

Willson, David

265,81 DKK

Cyber Security Awareness for Accountants and CPAs

Cyber Security Awareness for Accountants and CPAs

Willson, David

265,81 DKK

Cyber Security Awareness for Lawyers

Cyber Security Awareness for Lawyers

Willson, David

265,81 DKK

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications

Dehghantanha, Ali

656,09 DKK

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications

Dehghantanha, Ali

656,09 DKK

Google Talking

Google Talking

Brashars, Joshua

181,00 DKK

ASP Configuration Handbook

ASP Configuration Handbook

Syngress

253,01 DKK

Firewall Policies and VPN Configurations

Firewall Policies and VPN Configurations

Davis, Jennifer

302,96 DKK

Introduction to Cyber-Warfare

Introduction to Cyber-Warfare

Ruef, Andrew

295,53 DKK

Google Hacking for Penetration Testers

Google Hacking for Penetration Testers

Brown, Justin

403,64 DKK

configuring exchange server 2000

configuring exchange server 2000

Syngress

253,01 DKK

Placing the Suspect Behind the Keyboard

Placing the Suspect Behind the Keyboard

Shavers, Brett

343,95 DKK

Rick Gallahers MPLS Training Guide

Rick Gallahers MPLS Training Guide

Syngress

302,96 DKK

Check Point NGX R65 Security Administration

Check Point NGX R65 Security Administration

Bonnell, Ralph

343,95 DKK

Keys to the Kingdom

Keys to the Kingdom

Ollam, Deviant

366,80 DKK

Microsoft Log Parser Toolkit

Microsoft Log Parser Toolkit

Burnett, Mark

202,21 DKK

Configuring Citrix Metaframe for Windows 2000 Terminal Services

Configuring Citrix Metaframe for Windows 2000 Terminal Services

Craft, Melissa

253,01 DKK

Practical Oracle Security

Practical Oracle Security

Ingram, Aaron

302,96 DKK

Cybersecurity and Applied Mathematics

Cybersecurity and Applied Mathematics

Casey, William

473,39 DKK

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

Maynor, David

302,96 DKK

X-Ways Forensics Practitioner's Guide

X-Ways Forensics Practitioner's Guide

Zimmerman, Eric

343,95 DKK

Lossless Information Hiding in Images

Lossless Information Hiding in Images

Guo, Shi-Ze

473,39 DKK

Information Security Analytics

Information Security Analytics

Miyamoto, Inez

403,64 DKK

How to Cheat at Securing SQL Server 2005

How to Cheat at Securing SQL Server 2005

Horninger, Mark

253,01 DKK

Configuring Juniper Networks NetScreen and SSG Firewalls

Configuring Juniper Networks NetScreen and SSG Firewalls

Lorenzin, Lisa

238,03 DKK

Cyber Security Awareness for Corporate Directors and Board Members

Cyber Security Awareness for Corporate Directors and Board Members

Willson, David

265,81 DKK

Lossless Information Hiding in Images

Lossless Information Hiding in Images

Guo, Shi-Ze

473,39 DKK

Applied Cyber Security and the Smart Grid

Applied Cyber Security and the Smart Grid

Samani, Raj

343,95 DKK

Malware Forensics

Malware Forensics

Aquilina, James M.

403,64 DKK