20474 rezultatov
-
22 Murders Of Madison May(2021) BARRY, MAXFrom the author of Lexicon and Providence comes a thrilling speculative psychological suspense about a serial killer pursuing his victim across time and spaceVezava: Trda23,82 € -
Tools and Weapons(2021) SMITH, BRAD,BROWNE, CAROL ANNThe first book by Microsoft CLO Brad Smith, exploring the biggest questions facing humanity about techVezava: Mehka18,21 € -
-
BrightRED Study Guide National 5 Administration and IT - New Edition(2019) COOPER SIMPSON, COOPER SIMPSONVezava: Mehka28,50 € -
Big Data in Education(2017) WILLIAMSON, BENThis cutting-edge overview explores big data and the related topic of computer code, examining the implications for education and schooling for today and the near future.Vezava: Mehka72,57 € -
-
Introduction to Java Programming, Brief Version, Global Edition(2018) LIANG, Y.Vezava: Mehka142,72 € -
So You Want to Start a Podcast - Finding Your Voice, Telling Your Story, and Building a Community That Will Listen(2019) KRISTEN MEINZERVezava: Trda23,82 € -
Operating Systems: Internals and Design Principles, Global Edition(2017) STALLINGS, WILLIAMVezava: Mehka142,80 € -
Keys to the Kingdom(2012) OLLAM, DEVIANT (MEMBER OF THE BOARD OF DIRECTORS OF THE U.S. DIVISION OF TOOOL, THE OPEN ORGANISATION OF LOCKPICKERS AND SECURITY AUDITOR AND PENETRATION TESTING CONSULTANT WITH THE CORE GROUP)Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.Vezava: Mehka71,27 € -
Violent Python(2012) O'CONNOR, TJDemonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frameVezava: Mehka57,01 € -
Security Risk Management(2011) WHEELER, EVAN (OMGEO, BOSTON, MA, USA)Teaches you practical techniques that can be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. This book helps you break free from the so-called "best practices" argument by articulatingVezava: Mehka57,01 € -
Digital Forensics with Open Source Tools(2011) CARVEY, HARLAN (DFIR ANALYST, PRESENTER, AND OPEN-SOURCE TOOL AUTHOR),ALTHEIDE, CORYFocuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of fVezava: Mehka77,10 € -
Guide to Kernel Exploitation(2010) PERLA, ENRICO (KERNEL PROGRAMMER, ORACLE),OLDANI, MASSIMILIANO (SECURITY CONSULTANT, EMAZE NETWORKS)Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). This title discusses the most popular OS families - UNVezava: Mehka57,01 € -
Crime Dot Com(2021) WHITE, GEOFFA thrilling, true account of computer hacking – past, present and future.Vezava: Mehka18,21 €











