64 rezultatov
-
-
The Art of Deception: Controlling the Human Element of Security(2003) KEVIN MITNICKVezava: Mehka11,48 €
-
Inside Cyber Warfare(2024) CARUSO, JEFFREYIn the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East, including cyber attacks that result in the physicaVezava: Mehka57,71 €
-
Zero Trust Networks(2024) RAIS, RAZI,MORILLO, CHRISTINA,GILMAN, EVAN,BARTH, DOUGThis practical book provides a detailed explanation of the zero trust security model. The updated edition offers more scenarios, real-world examples, and in-depth explanations of key concepts to help you fully comprehend the zero trust security architectuVezava: Mehka67,97 €
-
-
Fundamentals of Information Systems Security(2021) KIM, DAVID,SOLOMON, MICHAEL G.Vezava: Mehka130,73 €
-
-
Web Application Security(2024) HOFFMAN, ANDREWIn this revised and updated second edition, author Andrew Hoffman examines dozens of related topics, from the latest types of attacks and mitigations to threat modeling, the secure software development lifecycle (SSDL/SDLC), and more.Vezava: Mehka67,97 €
-
Network Security, Firewalls, and VPNs(2020) STEWART, J. MICHAEL,KINSEY, DENISEVezava: Mehka130,73 €
-
Defensive Security Handbook(2024) BROTHERSTON, LEE,BERLIN, AMANDA,REYOR III, WILLIAM F.Many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help yVezava: Mehka67,97 €
-
Identity-Native Infrastructure Access Management(2023) KONTSEVOY, EV,SHAH, SAKSHYAM,CONRAD, PETERIn this practical book, authors Ev Kontsevoy, Sakshyam Shah, and Peter Conrad break this topic down into manageable pieces. You'll discover how different parts of the approach fit together in a way that enables engineering teams to build more secure appliVezava: Mehka51,40 €
-
Arista Warrior(2017) DONAHUE, GARY A.In this updated edition, renowned trainer, consultant, and technical author Gary A. Donahue (Network Warrior) provides an in-depth, objective guide to Arista’s products. You’ll learn why the company’s network switches, software products, and Extensible OpVezava: Mehka82,08 €
-
Violent Python(2012) O'CONNOR, TJDemonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frameVezava: Mehka50,52 €
-
-
-
-
Digital Forensics with Open Source Tools(2011) CARVEY, HARLAN (DFIR ANALYST, PRESENTER, AND OPEN-SOURCE TOOL AUTHOR),ALTHEIDE, CORYFocuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of fVezava: Mehka69,74 €
-
-
Keys to the Kingdom(2012) OLLAM, DEVIANT (MEMBER OF THE BOARD OF DIRECTORS OF THE U.S. DIVISION OF TOOOL, THE OPEN ORGANISATION OF LOCKPICKERS AND SECURITY AUDITOR AND PENETRATION TESTING CONSULTANT WITH THE CORE GROUP)Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.Vezava: Mehka64,30 €
-
BTEC Level 3 National IT Student Book 1(2010) ANDERSON, KAREN,JARVIS, ALAN,KAYE, ALLEN,PHILLIPS, JENNY,SMITH, ANDREW,MCGILL, RICHARDBTEC and Heinemann have joined forces to provide BTEC’s own resources to accompany the new BTEC Level 3 National IT specification, supporting learners every step of the way to BTEC success.Vezava: Mehka62,70 €