Syngress

Vis mig kun

Meeting People via WiFi and Bluetooth

Meeting People via WiFi and Bluetooth

Schroeder, Joshua

265,81 DKK

Building a Practical Information Security Program

Building a Practical Information Security Program

Leary, Mark

473,39 DKK

Zero-Day Exploit

Zero-Day Exploit

Shein, Rob

253,01 DKK

C#.Net Developer's Guide

C#.Net Developer's Guide

Albahari, Joseph

260,50 DKK

Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit

Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit

Varsalone, Jesse

366,80 DKK

Securing Social Media in the Enterprise

Securing Social Media in the Enterprise

Dalziel, Henry

265,81 DKK

Scene of the Cybercrime

Scene of the Cybercrime

Cross, Michael

329,95 DKK

Mobile Malware Attacks and Defense

Mobile Malware Attacks and Defense

Dunham, Ken

343,95 DKK

Basics of Information Security

Basics of Information Security

Andress, Jason

238,03 DKK

Virtualization for Security

Virtualization for Security

Hoopes, John

343,95 DKK

Professional Penetration Testing

Professional Penetration Testing

Wilhelm, Thomas

473,39 DKK

Securing SQL Server

Securing SQL Server

Cherry, Denny

329,95 DKK

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

Fair, Ted

202,21 DKK

Designing SQL Server 2000 Databases

Designing SQL Server 2000 Databases

Syngress

253,01 DKK

Securing Social Media in the Enterprise

Securing Social Media in the Enterprise

Dalziel, Henry

265,81 DKK

Cloud Storage Forensics

Cloud Storage Forensics

Choo, Raymond

403,64 DKK

Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit

Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit

Varsalone, Jesse

366,80 DKK

Hackproofing Your Wireless Network

Hackproofing Your Wireless Network

Syngress

253,01 DKK

How to Cheat at Securing Your Network

How to Cheat at Securing Your Network

Dubrawsky, Ido

253,01 DKK

How to Cheat at Configuring Exchange Server 2007

How to Cheat at Configuring Exchange Server 2007

Walther, Henrik

202,21 DKK

FISMA Compliance Handbook

FISMA Compliance Handbook

Taylor, Laura P.

403,64 DKK

Cloud Security Ecosystem

Cloud Security Ecosystem

Ko, Ryan

802,25 DKK

No Tech Hacking

No Tech Hacking

Long, Johnny

238,03 DKK

Configuring Check Point NGX VPN-1/Firewall-1

Configuring Check Point NGX VPN-1/Firewall-1

Desmeules, Simon

253,01 DKK

Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

Abraham, Ajin

265,81 DKK

Configuring NetScreen Firewalls

Configuring NetScreen Firewalls

Cameron, Rob

253,01 DKK

Applied Network Security Monitoring

Applied Network Security Monitoring

Smith, Jason

295,53 DKK

CISSP(R) Study Guide

CISSP(R) Study Guide

Conrad, Eric

583,01 DKK

CISSP(R) Study Guide

CISSP(R) Study Guide

Conrad, Eric

583,01 DKK

Introduction to Social Media Investigation

Introduction to Social Media Investigation

Golbeck, Jennifer

403,64 DKK