60 rezultatov
-
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers(2005) KEVIN MITNICKVezava: Mehka19,45 €
KEVIN MITNICK
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Zaloga po trgovinah
Rezultati:
-
The Art of Deception: Controlling the Human Element of Security(2003) KEVIN MITNICKVezava: Mehka13,90 €
KEVIN MITNICK
The Art of Deception: Controlling the Human Element of Security
Zaloga po trgovinah
Rezultati:
-
-
Fundamentals of Information Systems Security(2021) KIM, DAVID,SOLOMON, MICHAEL G.Vezava: Mehka100,06 €
KIM, DAVID,SOLOMON, MICHAEL G.
Fundamentals of Information Systems Security
Zaloga po trgovinah
Rezultati:
-
-
Web Application Security(2024) HOFFMAN, ANDREWIn this revised and updated second edition, author Andrew Hoffman examines dozens of related topics, from the latest types of attacks and mitigations to threat modeling, the secure software development lifecycle (SSDL/SDLC), and more.Vezava: Mehka67,97 €
HOFFMAN, ANDREW
Web Application Security
In this revised and updated second edition, author Andrew Hoffman examines dozens of related topics, from the latest types of attacks and mitigations to threat modeling, the secure software development lifecycle (SSDL/SDLC), and more.
Zaloga po trgovinah
Rezultati:
-
Network Security, Firewalls And Vpns(2020) STEWART, J. MICHAEL,KINSEY, DENISEVezava: Mehka100,06 €
STEWART, J. MICHAEL,KINSEY, DENISE
Network Security, Firewalls And Vpns
Zaloga po trgovinah
Rezultati:
-
Defensive Security Handbook(2024) BROTHERSTON, LEE,BERLIN, AMANDA,REYOR III, WILLIAM F.Many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help yVezava: Mehka67,97 €
BROTHERSTON, LEE,BERLIN, AMANDA,REYOR III, WILLIAM F.
Defensive Security Handbook
Many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help y
Zaloga po trgovinah
Rezultati:
-
Identity-Native Infrastructure Access Management(2023) KONTSEVOY, EV,SHAH, SAKSHYAM,CONRAD, PETERIn this practical book, authors Ev Kontsevoy, Sakshyam Shah, and Peter Conrad break this topic down into manageable pieces. You'll discover how different parts of the approach fit together in a way that enables engineering teams to build more secure appliVezava: Mehka51,40 €
KONTSEVOY, EV,SHAH, SAKSHYAM,CONRAD, PETER
Identity-Native Infrastructure Access Management
In this practical book, authors Ev Kontsevoy, Sakshyam Shah, and Peter Conrad break this topic down into manageable pieces. You'll discover how different parts of the approach fit together in a way that enables engineering teams to build more secure appli
Zaloga po trgovinah
Rezultati:
-
Arista Warrior(2017) DONAHUE, GARY A.In this updated edition, renowned trainer, consultant, and technical author Gary A. Donahue (Network Warrior) provides an in-depth, objective guide to Arista’s products. You’ll learn why the company’s network switches, software products, and Extensible OpVezava: Mehka82,08 €
DONAHUE, GARY A.
Arista Warrior
In this updated edition, renowned trainer, consultant, and technical author Gary A. Donahue (Network Warrior) provides an in-depth, objective guide to Arista’s products. You’ll learn why the company’s network switches, software products, and Extensible Op
Zaloga po trgovinah
Rezultati:
-
Violent Python(2012) O'CONNOR, TJDemonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frameVezava: Mehka50,52 €
O'CONNOR, TJ
Violent Python
Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frame
Zaloga po trgovinah
Rezultati:
-
-
Incident Response & Computer Forensics, Third Edition(2014) JASON LUTTGENSVezava: Mehka64,13 €
JASON LUTTGENS
Incident Response & Computer Forensics, Third Edition
Zaloga po trgovinah
Rezultati:
-
Information Security Risk Assessment Toolkit(2012) TALABIS, MARK (CHIEF THREAT SCIENTIST OF ZVELO INC),MARTIN, JASON (IS THE VICE PRESIDENT OF CLOUD BUSINESS FOR FIREEYE, INC.)Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing aVezava: Mehka55,11 €
TALABIS, MARK (CHIEF THREAT SCIENTIST OF ZVELO INC),MARTIN, JASON (IS THE VICE PRESIDENT OF CLOUD BUSINESS FOR FIREEYE, INC.)
Information Security Risk Assessment Toolkit
Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a
Zaloga po trgovinah
Rezultati:
-
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2E(2011) DAFYDD STUTTARDVezava: Mehka59,00 €
DAFYDD STUTTARD
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2E
Zaloga po trgovinah
Rezultati:
-
Digital Forensics with Open Source Tools(2011) CARVEY, HARLAN (DFIR ANALYST, PRESENTER, AND OPEN-SOURCE TOOL AUTHOR),ALTHEIDE, CORYFocuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of fVezava: Mehka69,74 €
CARVEY, HARLAN (DFIR ANALYST, PRESENTER, AND OPEN-SOURCE TOOL AUTHOR),ALTHEIDE, CORY
Digital Forensics with Open Source Tools
Focuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of f
Zaloga po trgovinah
Rezultati:
-
-
Keys to the Kingdom(2012) OLLAM, DEVIANT (MEMBER OF THE BOARD OF DIRECTORS OF THE U.S. DIVISION OF TOOOL, THE OPEN ORGANISATION OF LOCKPICKERS AND SECURITY AUDITOR AND PENETRATION TESTING CONSULTANT WITH THE CORE GROUP)Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.Vezava: Mehka64,30 €
OLLAM, DEVIANT (MEMBER OF THE BOARD OF DIRECTORS OF THE U.S. DIVISION OF TOOOL, THE OPEN ORGANISATION OF LOCKPICKERS AND SECURITY AUDITOR AND PENETRATION TESTING CONSULTANT WITH THE CORE GROUP)
Keys to the Kingdom
Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.
Zaloga po trgovinah
Rezultati:
-
BTEC Level 3 National IT Student Book 1(2010) ANDERSON, KAREN,JARVIS, ALAN,KAYE, ALLEN,PHILLIPS, JENNY,SMITH, ANDREW,MCGILL, RICHARDBTEC and Heinemann have joined forces to provide BTEC's own resources to accompany the new BTEC Level 3 National IT specification, supporting learners every step of the way to BTEC success.Vezava: Mehka62,70 €
ANDERSON, KAREN,JARVIS, ALAN,KAYE, ALLEN,PHILLIPS, JENNY,SMITH, ANDREW,MCGILL, RICHARD
BTEC Level 3 National IT Student Book 1
BTEC and Heinemann have joined forces to provide BTEC's own resources to accompany the new BTEC Level 3 National IT specification, supporting learners every step of the way to BTEC success.
Zaloga po trgovinah
Rezultati:
-
Basics of Cyber Warfare(2012) ANDRESS, JASON (CISSP, ISSAP, CISM, GPEN),WINTERFELD, STEVE ((CISSP, PMP, SANS GSEC, SIX SIGMA) HAS A STRONG TECHNICAL AND LEADERSHIP BACKGROUND IN CYBERSECURITY AND MILITARY INTELLIGENCE.)Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics aVezava: Mehka30,31 €
ANDRESS, JASON (CISSP, ISSAP, CISM, GPEN),WINTERFELD, STEVE ((CISSP, PMP, SANS GSEC, SIX SIGMA) HAS A STRONG TECHNICAL AND LEADERSHIP BACKGROUND IN CYBERSECURITY AND MILITARY INTELLIGENCE.)
Basics of Cyber Warfare
Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics a
Zaloga po trgovinah
Rezultati: