Syngress

Vis mig kun

Mezonic Agenda: Hacking the Presidency

Mezonic Agenda: Hacking the Presidency

Thomson, Herbert

173,39 DKK

Dr Tom Shinder's ISA Server and Beyond

Dr Tom Shinder's ISA Server and Beyond

Syngress

310,39 DKK

Logging and Log Management

Logging and Log Management

Chuvakin, Anton

238,03 DKK

Cybercrime and Espionage

Cybercrime and Espionage

Pirc, John

288,10 DKK

Microsoft Virtualization

Microsoft Virtualization

Keefer, Robert M

280,67 DKK

Practical Lock Picking

Practical Lock Picking

Ollam, Deviant

302,96 DKK

Virtualization and Forensics

Virtualization and Forensics

Barrett, Diane

343,95 DKK

Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data

Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data

Aquilina, James M.

142,94 DKK

Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data

Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data

Aquilina, James M.

142,94 DKK

Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit

Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit

Liu, Dale

230,54 DKK

Netcat Power Tools

Netcat Power Tools

Kanclirz, Jan

343,95 DKK

Phishing Exposed

Phishing Exposed

James, Lance

253,01 DKK

Real MCTS/MCITP Exam 70-649 Prep Kit

Real MCTS/MCITP Exam 70-649 Prep Kit

Posey, Brien

302,96 DKK

Web Application Vulnerabilities

Web Application Vulnerabilities

Palmer, Steven

366,80 DKK

Hardware Hacking

Hardware Hacking

Russell, Ryan

202,21 DKK

Unified Communications Forensics

Unified Communications Forensics

Shaw, Joseph II

295,53 DKK

Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

Abraham, Ajin

265,81 DKK

Building CISCO Networks for Windows 2000

Building CISCO Networks for Windows 2000

Syngress

295,53 DKK

Cyber Security Awareness for CEOs and Management

Cyber Security Awareness for CEOs and Management

Willson, David

265,81 DKK

Data Breach Preparation and Response

Data Breach Preparation and Response

Fowler, Kevvie

473,39 DKK

Federal Cloud Computing

Federal Cloud Computing

Metheny, Matthew

473,39 DKK

Building an Intelligence-Led Security Program

Building an Intelligence-Led Security Program

Liska, Allan

473,39 DKK

Microsoft Forefront Security Administration Guide

Microsoft Forefront Security Administration Guide

Varsalone, Jesse

302,96 DKK

Practical Deployment of Cisco Identity Services Engine (ISE)

Practical Deployment of Cisco Identity Services Engine (ISE)

Wood, Jeremy

473,39 DKK

Hack Proofing Your Identity In The Information Age

Hack Proofing Your Identity In The Information Age

Syngress

202,21 DKK

How to Cheat at IT Project Management

How to Cheat at IT Project Management

Snedaker, Susan

223,05 DKK

Eleventh Hour CISSP(R)

Eleventh Hour CISSP(R)

Conrad, Eric

205,98 DKK

Hack Proofing Your Web Applications

Hack Proofing Your Web Applications

Syngress

253,01 DKK

Snort 2.1 Intrusion Detection, Second Edition

Snort 2.1 Intrusion Detection, Second Edition

Beale, Jay

253,01 DKK

Applied Network Security Monitoring

Applied Network Security Monitoring

Smith, Jason

295,53 DKK