299 rezultatov

  • Ogled izdelka
    Incident Response & Computer Forensics, Third Edition(2014) JASON LUTTGENS
    Vezava: Mehka
    64,13 €
  • Ogled izdelka
    Basics of Web Design: Pearson New International Edition: Html5 & Css3(2013) TERRY FELKE MORRIS
    Vezava: Mehka
    136,48 €
  • Ogled izdelka
    Networks: A Very Short Introduction(2012) GUIDO CALDARELLI
    Vezava: Mehka
    12,50 €
  • Ogled izdelka
    Information Security Risk Assessment Toolkit(2012) TALABIS, MARK (CHIEF THREAT SCIENTIST OF ZVELO INC),MARTIN, JASON (IS THE VICE PRESIDENT OF CLOUD BUSINESS FOR FIREEYE, INC.)
    Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a
    55,11 €
  • Ogled izdelka
    The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2E(2011) DAFYDD STUTTARD
    Vezava: Mehka
    59,00 €
  • Ogled izdelka
    Spectrum and Network Measurements(2014) WITTE, ROBERT A.
    This updated edition of the industry's classic text combines the theory, practice, and latest technology of spectrum and network measurements in electronic systems to offer a comprehensive and easy way to understand frequency domain measurements.
    120,43 €
  • Ogled izdelka
    Digital Forensics with Open Source Tools(2011) CARVEY, HARLAN (DFIR ANALYST, PRESENTER, AND OPEN-SOURCE TOOL AUTHOR),ALTHEIDE, CORY
    Focuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of f
    69,74 €
  • Ogled izdelka
    24 Deadly Sins of Software Security(2010) HOWARD
    78,24 €
  • Ogled izdelka
    Internet Linguistics: A Student Guide(2011) DAVID CRYSTAL
    Vezava: Mehka
    67,97 €
  • Ogled izdelka
    Keys to the Kingdom(2012) OLLAM, DEVIANT (MEMBER OF THE BOARD OF DIRECTORS OF THE U.S. DIVISION OF TOOOL, THE OPEN ORGANISATION OF LOCKPICKERS AND SECURITY AUDITOR AND PENETRATION TESTING CONSULTANT WITH THE CORE GROUP)
    Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.
    64,30 €
  • Ogled izdelka
    BTEC Level 3 National IT Student Book 1(2010) ANDERSON, KAREN,JARVIS, ALAN,KAYE, ALLEN,PHILLIPS, JENNY,SMITH, ANDREW,MCGILL, RICHARD
    BTEC and Heinemann have joined forces to provide BTEC's own resources to accompany the new BTEC Level 3 National IT specification, supporting learners every step of the way to BTEC success.
    62,70 €
  • Ogled izdelka
    Basics of Cyber Warfare(2012) ANDRESS, JASON (CISSP, ISSAP, CISM, GPEN),WINTERFELD, STEVE ((CISSP, PMP, SANS GSEC, SIX SIGMA) HAS A STRONG TECHNICAL AND LEADERSHIP BACKGROUND IN CYBERSECURITY AND MILITARY INTELLIGENCE.)
    Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics a
    30,31 €
  • Ogled izdelka
    TCP/IP Sockets in C(2009) DONAHOO, MICHAEL J. (BAYLOR UNIVERSITY, WACO, TX, USA),CALVERT, KENNETH L. (UNIVERSITY OF KENTUCKY, LEXINGTON, KY, USA)
    Helps you to gain the knowledge and skills needed to develop web-based applications. This book features tutorial-based approach that enables the reader to master the tasks and techniques essential to the various client-server projects using sockets in C.
    40,18 €
  • Ogled izdelka
    Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots(2022) HUANG ET AL
    Vezava: Mehka
    135,80 €
  • Ogled izdelka
    Future Telco - Successful Positioning of Network Operators in the Digital Age(2018)
    This book examines the extensive changes in markets, technologies and value chains that telecommunication companies are currently confronted with.
    71,55 €
  • Ogled izdelka
    BTEC Nationals Information Technology Student Book + Activebook(2016) PHILLIPS, JENNY,JARVIS, ALAN,FISHPOOL, MARK,MCGILL, RICHARD,COOK, TIM,ATKINSON-BEAUMONT, DAVID
    56,64 €
  • Ogled izdelka
    Marx and the Robots - Networked Production, AI and Human Labour(2022) FLORIAN BUTOLLO
    Vezava: Mehka
    34,44 €
  • Ogled izdelka
    Grokking Bitcoin(2019) KALLE ROSENBAUM
    Vezava: Mehka
    55,11 €
  • Ogled izdelka
    Perfect Weapon(2018) SANGER, DAVID
    20,83 €
  • Ogled izdelka
    Exploring Malicious Hacker Communities(2021) MARIN, ERICSSON (CALIFORNIA STATE POLYTECHNIC UNIVERSITY, POMONA),ALMUKAYNIZI, MOHAMMED (KING SAUD UNIVERSITY, SAUDI ARABIA),SARKAR, SOUMAJYOTI (ARIZONA STATE UNIVERSITY),NUNES, ERIC (ARIZONA STATE UNIVERSITY),SHAKARIAN, JANA,SHAKARIAN, PAULO
    As cyber threats become ever more frequent, a proactive defense that shifts attention from the defender to the attacker environment is key to designing better attack prediction systems. This book offers models to analyze threat intelligence mined from mal
    91,58 €

Ostali so si ogledali tudi ...