299 rezultatov
-
Incident Response & Computer Forensics, Third Edition(2014) JASON LUTTGENSVezava: Mehka64,13 €
JASON LUTTGENS
Incident Response & Computer Forensics, Third Edition
Zaloga po trgovinah
Rezultati:
-
Basics of Web Design: Pearson New International Edition: Html5 & Css3(2013) TERRY FELKE MORRISVezava: Mehka136,48 €
TERRY FELKE MORRIS
Basics of Web Design: Pearson New International Edition: Html5 & Css3
Zaloga po trgovinah
Rezultati:
-
-
Information Security Risk Assessment Toolkit(2012) TALABIS, MARK (CHIEF THREAT SCIENTIST OF ZVELO INC),MARTIN, JASON (IS THE VICE PRESIDENT OF CLOUD BUSINESS FOR FIREEYE, INC.)Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a55,11 €
TALABIS, MARK (CHIEF THREAT SCIENTIST OF ZVELO INC),MARTIN, JASON (IS THE VICE PRESIDENT OF CLOUD BUSINESS FOR FIREEYE, INC.)
Information Security Risk Assessment Toolkit
Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a
Zaloga po trgovinah
Rezultati:
-
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2E(2011) DAFYDD STUTTARDVezava: Mehka59,00 €
DAFYDD STUTTARD
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2E
Zaloga po trgovinah
Rezultati:
-
Spectrum and Network Measurements(2014) WITTE, ROBERT A.This updated edition of the industry's classic text combines the theory, practice, and latest technology of spectrum and network measurements in electronic systems to offer a comprehensive and easy way to understand frequency domain measurements.120,43 €
WITTE, ROBERT A.
Spectrum and Network Measurements
This updated edition of the industry's classic text combines the theory, practice, and latest technology of spectrum and network measurements in electronic systems to offer a comprehensive and easy way to understand frequency domain measurements.
Zaloga po trgovinah
Rezultati:
-
Digital Forensics with Open Source Tools(2011) CARVEY, HARLAN (DFIR ANALYST, PRESENTER, AND OPEN-SOURCE TOOL AUTHOR),ALTHEIDE, CORYFocuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of f69,74 €
CARVEY, HARLAN (DFIR ANALYST, PRESENTER, AND OPEN-SOURCE TOOL AUTHOR),ALTHEIDE, CORY
Digital Forensics with Open Source Tools
Focuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of f
Zaloga po trgovinah
Rezultati:
-
-
-
Keys to the Kingdom(2012) OLLAM, DEVIANT (MEMBER OF THE BOARD OF DIRECTORS OF THE U.S. DIVISION OF TOOOL, THE OPEN ORGANISATION OF LOCKPICKERS AND SECURITY AUDITOR AND PENETRATION TESTING CONSULTANT WITH THE CORE GROUP)Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.64,30 €
OLLAM, DEVIANT (MEMBER OF THE BOARD OF DIRECTORS OF THE U.S. DIVISION OF TOOOL, THE OPEN ORGANISATION OF LOCKPICKERS AND SECURITY AUDITOR AND PENETRATION TESTING CONSULTANT WITH THE CORE GROUP)
Keys to the Kingdom
Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.
Zaloga po trgovinah
Rezultati:
-
BTEC Level 3 National IT Student Book 1(2010) ANDERSON, KAREN,JARVIS, ALAN,KAYE, ALLEN,PHILLIPS, JENNY,SMITH, ANDREW,MCGILL, RICHARDBTEC and Heinemann have joined forces to provide BTEC's own resources to accompany the new BTEC Level 3 National IT specification, supporting learners every step of the way to BTEC success.62,70 €
ANDERSON, KAREN,JARVIS, ALAN,KAYE, ALLEN,PHILLIPS, JENNY,SMITH, ANDREW,MCGILL, RICHARD
BTEC Level 3 National IT Student Book 1
BTEC and Heinemann have joined forces to provide BTEC's own resources to accompany the new BTEC Level 3 National IT specification, supporting learners every step of the way to BTEC success.
Zaloga po trgovinah
Rezultati:
-
Basics of Cyber Warfare(2012) ANDRESS, JASON (CISSP, ISSAP, CISM, GPEN),WINTERFELD, STEVE ((CISSP, PMP, SANS GSEC, SIX SIGMA) HAS A STRONG TECHNICAL AND LEADERSHIP BACKGROUND IN CYBERSECURITY AND MILITARY INTELLIGENCE.)Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics a30,31 €
ANDRESS, JASON (CISSP, ISSAP, CISM, GPEN),WINTERFELD, STEVE ((CISSP, PMP, SANS GSEC, SIX SIGMA) HAS A STRONG TECHNICAL AND LEADERSHIP BACKGROUND IN CYBERSECURITY AND MILITARY INTELLIGENCE.)
Basics of Cyber Warfare
Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics a
Zaloga po trgovinah
Rezultati:
-
TCP/IP Sockets in C(2009) DONAHOO, MICHAEL J. (BAYLOR UNIVERSITY, WACO, TX, USA),CALVERT, KENNETH L. (UNIVERSITY OF KENTUCKY, LEXINGTON, KY, USA)Helps you to gain the knowledge and skills needed to develop web-based applications. This book features tutorial-based approach that enables the reader to master the tasks and techniques essential to the various client-server projects using sockets in C.40,18 €
DONAHOO, MICHAEL J. (BAYLOR UNIVERSITY, WACO, TX, USA),CALVERT, KENNETH L. (UNIVERSITY OF KENTUCKY, LEXINGTON, KY, USA)
TCP/IP Sockets in C
Helps you to gain the knowledge and skills needed to develop web-based applications. This book features tutorial-based approach that enables the reader to master the tasks and techniques essential to the various client-server projects using sockets in C.
Zaloga po trgovinah
Rezultati:
-
Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots(2022) HUANG ET ALVezava: Mehka135,80 €
HUANG ET AL
Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots
Zaloga po trgovinah
Rezultati:
-
Future Telco - Successful Positioning of Network Operators in the Digital Age(2018)This book examines the extensive changes in markets, technologies and value chains that telecommunication companies are currently confronted with.71,55 €
Future Telco - Successful Positioning of Network Operators in the Digital Age
This book examines the extensive changes in markets, technologies and value chains that telecommunication companies are currently confronted with.
Zaloga po trgovinah
Rezultati:
-
BTEC Nationals Information Technology Student Book + Activebook(2016) PHILLIPS, JENNY,JARVIS, ALAN,FISHPOOL, MARK,MCGILL, RICHARD,COOK, TIM,ATKINSON-BEAUMONT, DAVID56,64 €
PHILLIPS, JENNY,JARVIS, ALAN,FISHPOOL, MARK,MCGILL, RICHARD,COOK, TIM,ATKINSON-BEAUMONT, DAVID
BTEC Nationals Information Technology Student Book + Activebook
Zaloga po trgovinah
Rezultati:
-
Marx and the Robots - Networked Production, AI and Human Labour(2022) FLORIAN BUTOLLOVezava: Mehka34,44 €
FLORIAN BUTOLLO
Marx and the Robots - Networked Production, AI and Human Labour
Zaloga po trgovinah
Rezultati:
-
-
-
Exploring Malicious Hacker Communities(2021) MARIN, ERICSSON (CALIFORNIA STATE POLYTECHNIC UNIVERSITY, POMONA),ALMUKAYNIZI, MOHAMMED (KING SAUD UNIVERSITY, SAUDI ARABIA),SARKAR, SOUMAJYOTI (ARIZONA STATE UNIVERSITY),NUNES, ERIC (ARIZONA STATE UNIVERSITY),SHAKARIAN, JANA,SHAKARIAN, PAULOAs cyber threats become ever more frequent, a proactive defense that shifts attention from the defender to the attacker environment is key to designing better attack prediction systems. This book offers models to analyze threat intelligence mined from mal91,58 €
MARIN, ERICSSON (CALIFORNIA STATE POLYTECHNIC UNIVERSITY, POMONA),ALMUKAYNIZI, MOHAMMED (KING SAUD UNIVERSITY, SAUDI ARABIA),SARKAR, SOUMAJYOTI (ARIZONA STATE UNIVERSITY),NUNES, ERIC (ARIZONA STATE UNIVERSITY),SHAKARIAN, JANA,SHAKARIAN, PAULO
Exploring Malicious Hacker Communities
As cyber threats become ever more frequent, a proactive defense that shifts attention from the defender to the attacker environment is key to designing better attack prediction systems. This book offers models to analyze threat intelligence mined from mal
Zaloga po trgovinah
Rezultati: