Syngress

Vis mig kun

Business Continuity and Disaster Recovery Planning for IT Professionals

Business Continuity and Disaster Recovery Planning for IT Professionals

Snedaker, Susan

403,64 DKK

Hack Proofing XML

Hack Proofing XML

Syngress

253,01 DKK

Handbook of System Safety and Security

Handbook of System Safety and Security

Griffor, Edward

1313,81 DKK

Cybercrime Case Presentation

Cybercrime Case Presentation

Shavers, Brett

127,71 DKK

Cybercrime Case Presentation

Cybercrime Case Presentation

Shavers, Brett

127,71 DKK

Black Hat Physical Device Security: Exploiting Hardware and Software

Black Hat Physical Device Security: Exploiting Hardware and Software

Miller, Drew

260,50 DKK

Best Damn Exchange, SQL and IIS Book Period

Best Damn Exchange, SQL and IIS Book Period

Adams, Chris

366,80 DKK

Hacking Web Intelligence

Hacking Web Intelligence

Panda, Nutan Kumar

403,64 DKK

Penetration Tester's Open Source Toolkit

Penetration Tester's Open Source Toolkit

Faircloth, Jeremy

295,53 DKK

Linksys WRT54G Ultimate Hacking

Linksys WRT54G Ultimate Hacking

Pesce, Larry

202,21 DKK

Coding for Penetration Testers

Coding for Penetration Testers

Linn, Ryan

329,95 DKK

Google Earth Forensics

Google Earth Forensics

Cross, Michael

265,81 DKK

MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network (Exam 70-214)

MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network (Exam 70-214)

Syngress

310,39 DKK

Investigating Internet Crimes

Investigating Internet Crimes

Bowker, Art

295,53 DKK

Building a Practical Information Security Program

Building a Practical Information Security Program

Leary, Mark

473,39 DKK

Building an Information Security Awareness Program

Building an Information Security Awareness Program

Thomas, Valerie

403,64 DKK

CSA Guide to Cloud Computing

CSA Guide to Cloud Computing

Reavis, Jim

403,64 DKK

Syngress Force Emerging Threat Analysis

Syngress Force Emerging Threat Analysis

Graham, Robert

253,01 DKK

Hacking Wireless Access Points

Hacking Wireless Access Points

Kurtz, Jennifer

329,95 DKK

Executing Windows Command Line Investigations

Executing Windows Command Line Investigations

Pelli, Rosanne

473,39 DKK

Penetration Tester's Open Source Toolkit

Penetration Tester's Open Source Toolkit

Moore, HD

295,53 DKK

Securing Citrix XenApp Server in the Enterprise

Securing Citrix XenApp Server in the Enterprise

Azad, Tariq

366,80 DKK

Cyber Warfare

Cyber Warfare

Winterfeld, Steve

238,03 DKK

Configuring SonicWALL Firewalls

Configuring SonicWALL Firewalls

Bendell, Dan

253,01 DKK

Basics of Information Security

Basics of Information Security

Andress, Jason

238,03 DKK

Security Controls Evaluation, Testing, and Assessment Handbook

Security Controls Evaluation, Testing, and Assessment Handbook

Johnson, Leighton

509,93 DKK

Configuring IPv6 For Cisco IOS

Configuring IPv6 For Cisco IOS

Syngress

343,95 DKK

Cybersecurity and Applied Mathematics

Cybersecurity and Applied Mathematics

Casey, William

473,39 DKK

Cisco AVVID and IP Telephony Design and Implementation

Cisco AVVID and IP Telephony Design and Implementation

Lawson, Wayne

343,95 DKK

Buffer Overflow Attacks

Buffer Overflow Attacks

Deckard, Jason

181,00 DKK