Syngress

Vis mig kun

Advanced Persistent Threat

Advanced Persistent Threat

Cole, Eric

366,80 DKK

Seven Deadliest Microsoft Attacks

Seven Deadliest Microsoft Attacks

Borkin, Mike

127,71 DKK

PCI Compliance

PCI Compliance

Williams, Branden R.

343,95 DKK

Hacker's Guide to OS X

Hacker's Guide to OS X

Rogers, Russ

238,03 DKK

Eleventh Hour CISSP

Eleventh Hour CISSP

Feldman, Joshua

25,00 DKK

Managed Code Rootkits

Managed Code Rootkits

Metula, Erez

238,03 DKK

Digital Forensics for Legal Professionals

Digital Forensics for Legal Professionals

Daniel, Lars

343,95 DKK

Basics of Information Security

Basics of Information Security

Andress, Jason

150,55 DKK

Seven Deadliest USB Attacks

Seven Deadliest USB Attacks

Anderson, Barbara

127,71 DKK

Information Security Risk Assessment Toolkit

Information Security Risk Assessment Toolkit

Martin, Jason

302,96 DKK

iPhone and iOS Forensics

iPhone and iOS Forensics

Strzempka, Katie

403,64 DKK

Information Security Risk Assessment Toolkit

Information Security Risk Assessment Toolkit

Martin, Jason

302,96 DKK

FISMA and the Risk Management Framework

FISMA and the Risk Management Framework

Gantz, Stephen D.

403,64 DKK

Windows Server 2012 Security from End to Edge and Beyond

Windows Server 2012 Security from End to Edge and Beyond

Shinder, Thomas W

436,85 DKK

FISMA and the Risk Management Framework

FISMA and the Risk Management Framework

Gantz, Stephen D.

403,64 DKK

Basics of Information Security

Basics of Information Security

Andress, Jason

150,55 DKK

Windows Server 2012 Security from End to Edge and Beyond

Windows Server 2012 Security from End to Edge and Beyond

Shinder, Thomas W

436,85 DKK

Seven Deadliest USB Attacks

Seven Deadliest USB Attacks

Anderson, Barbara

127,71 DKK

Digital Forensics Processing and Procedures

Digital Forensics Processing and Procedures

Jones, Andrew

403,64 DKK

Client-Side Attacks and Defense

Client-Side Attacks and Defense

Shimonski, Robert

238,03 DKK

Client-Side Attacks and Defense

Client-Side Attacks and Defense

Shimonski, Robert

238,03 DKK

Windows 2012 Server Network Security

Windows 2012 Server Network Security

Rountree, Derrick

295,53 DKK

Guide to Kernel Exploitation

Guide to Kernel Exploitation

Oldani, Massimiliano

280,67 DKK

CISSP Study Guide

CISSP Study Guide

Feldman, Joshua

25,00 DKK

How to Cheat at Microsoft Vista Administration

How to Cheat at Microsoft Vista Administration

Kanclirz, Jan

253,01 DKK

Snort Intrusion Detection and Prevention Toolkit

Snort Intrusion Detection and Prevention Toolkit

Baker, Andrew

238,03 DKK

Basics of Digital Forensics

Basics of Digital Forensics

Sammons, John

238,03 DKK

Federated Identity Primer

Federated Identity Primer

Rountree, Derrick

154,35 DKK

Essential Skills for Hackers

Essential Skills for Hackers

Dalziel, Henry

265,81 DKK

Next Generation Red Teaming

Next Generation Red Teaming

Dalziel, Henry

265,81 DKK