Syngress

Vis mig kun

Enemy at the Water Cooler

Enemy at the Water Cooler

Contos, Brian T

260,50 DKK

Developing .Net Web Services With XML

Developing .Net Web Services With XML

Syngress

253,01 DKK

SSCP Systems Security Certified Practitioner Study Guide and DVD Training System

SSCP Systems Security Certified Practitioner Study Guide and DVD Training System

Syngress

310,39 DKK

Nessus, Snort, and Ethereal Power Tools

Nessus, Snort, and Ethereal Power Tools

Rathaus, Noam

209,76 DKK

How to Cheat at Securing a Wireless Network

How to Cheat at Securing a Wireless Network

Barken, Lee

196,23 DKK

Netcat Power Tools

Netcat Power Tools

Kanclirz, Jan

343,95 DKK

UNIX and Linux Forensic Analysis DVD Toolkit

UNIX and Linux Forensic Analysis DVD Toolkit

Haverkos, Todd

403,64 DKK

Smart Grid Security

Smart Grid Security

Smith, Paul Dr.

802,25 DKK

Collaboration with Cloud Computing

Collaboration with Cloud Computing

Messier, Ric

329,95 DKK

Guide to Kernel Exploitation

Guide to Kernel Exploitation

Oldani, Massimiliano

280,67 DKK

MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure(Exam 70-297)

MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure(Exam 70-297)

Syngress

302,96 DKK

Hacking Web Intelligence

Hacking Web Intelligence

Panda, Nutan Kumar

403,64 DKK

Data Hiding Techniques in Windows OS

Data Hiding Techniques in Windows OS

Hijazi, Rami

329,95 DKK

Cisco Security Specialists Guide to PIX Firewall

Cisco Security Specialists Guide to PIX Firewall

Syngress

302,96 DKK

Research Methods for Cyber Security

Research Methods for Cyber Security

Manz, David O.

802,25 DKK

Cisco Router and Switch Forensics

Cisco Router and Switch Forensics

Liu, Dale

288,10 DKK

Cyber Warfare

Cyber Warfare

Winterfeld, Steve

25,00 DKK

Winternals Defragmentation, Recovery, and Administration Field Guide

Winternals Defragmentation, Recovery, and Administration Field Guide

Hunter, Laura E

253,01 DKK

Troubleshooting Windows 2000 TCP/IP

Troubleshooting Windows 2000 TCP/IP

Syngress

253,01 DKK

Digital Forensics

Digital Forensics

Sammons, John

329,95 DKK

Implementing Digital Forensic Readiness

Implementing Digital Forensic Readiness

Sachowski, Jason

403,64 DKK

Introduction to Social Media Investigation

Introduction to Social Media Investigation

Golbeck, Jennifer

403,64 DKK

Software Piracy Exposed

Software Piracy Exposed

Honick, Ron

202,21 DKK

Juniper(r) Networks Secure Access SSL VPN Configuration Guide

Juniper(r) Networks Secure Access SSL VPN Configuration Guide

Wyler, Neil R.

366,80 DKK

Practical Anonymity

Practical Anonymity

Loshin, Peter

184,80 DKK

Building a Digital Forensic Laboratory

Building a Digital Forensic Laboratory

Valli, Craig

473,39 DKK

Managing Catastrophic Loss of Sensitive Data

Managing Catastrophic Loss of Sensitive Data

Photopoulos, Constantine

366,80 DKK

Cisco Security Professional's Guide to Secure Intrusion Detection Systems

Cisco Security Professional's Guide to Secure Intrusion Detection Systems

Syngress

288,10 DKK

Basics of Web Hacking

Basics of Web Hacking

Pauli, Josh

150,55 DKK

DNS Security

DNS Security

Stowe, Geoffrey

329,95 DKK