20614 rezultatov
-
BrightRED Study Guide National 5 Administration and IT - New Edition(2019) COOPER SIMPSON, COOPER SIMPSONVezava: Mehka28,50 €
-
Ultimate Guide to Link Building(2020) FRENCH, GARRETT,WARD, ERICIn the latest edition of Ultimate Guide to Link Building, link building and online marketing expert Garrett French shows you, step by step, how to employ a link-building campaign that attracts quality links, drives more traffic to your website and earns yVezava: Mehka24,70 €
-
Big Data in Education(2017) WILLIAMSON, BENThis cutting-edge overview explores big data and the related topic of computer code, examining the implications for education and schooling for today and the near future.Vezava: Mehka68,89 €
-
Data Centers(2020)Who manages our data? A look behind the scenes of state-of-the-art IT infrastructures. Data centers are high-tech functional buildings, strictly protected treasuries and covert centers of power. The first comprehensive analysis of the history and presVezava: Mehka42,06 €
-
-
-
Introduction to Java Programming, Brief Version, Global Edition(2018) LIANG, Y.Vezava: Mehka142,72 €
-
So You Want to Start a Podcast - Finding Your Voice, Telling Your Story, and Building a Community That Will Listen(2019) KRISTEN MEINZERVezava: Trda23,82 €
-
Operating Systems: Internals and Design Principles, Global Edition(2017) STALLINGS, WILLIAMVezava: Mehka142,80 €
-
Keys to the Kingdom(2012) OLLAM, DEVIANT (MEMBER OF THE BOARD OF DIRECTORS OF THE U.S. DIVISION OF TOOOL, THE OPEN ORGANISATION OF LOCKPICKERS AND SECURITY AUDITOR AND PENETRATION TESTING CONSULTANT WITH THE CORE GROUP)Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.Vezava: Mehka71,27 €
-
Violent Python(2012) O'CONNOR, TJDemonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frameVezava: Mehka57,01 €
-
Security Risk Management(2011) WHEELER, EVAN (OMGEO, BOSTON, MA, USA)Teaches you practical techniques that can be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. This book helps you break free from the so-called "best practices" argument by articulatingVezava: Mehka57,01 €
-
Digital Forensics with Open Source Tools(2011) CARVEY, HARLAN (DFIR ANALYST, PRESENTER, AND OPEN-SOURCE TOOL AUTHOR),ALTHEIDE, CORYFocuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of fVezava: Mehka77,10 €
-
Guide to Kernel Exploitation(2010) PERLA, ENRICO (KERNEL PROGRAMMER, ORACLE),OLDANI, MASSIMILIANO (SECURITY CONSULTANT, EMAZE NETWORKS)Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). This title discusses the most popular OS families - UNVezava: Mehka57,01 €
-
Crime Dot Com(2021) WHITE, GEOFFA thrilling, true account of computer hacking – past, present and future.Vezava: Mehka18,21 €
-
BTEC National Computing Student Book(2017) PHILLIPS, JENNY,JARVIS, ALAN,MCGILL, RICHARD,FISHPOOL, MARK,COOK, TIM,ATKINSON-BEAUMONT, DAVID62,71 €
-
Principles of Business Information Systems(2020) STAIR, RALPH (PROFESSOR EMERITUS),REYNOLDS, GEORGE (STRAYER UNIVERSITY),CHESNEY, THOMAS (NOTTINGHAM UNIVERSITY BUSINESS SCHOOL)Vezava: Mehka115,27 €