Zbirka: Omrežna varnost

60 rezultatov

  • Ogled izdelka
    The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers(2005) KEVIN MITNICK
    Vezava: Mehka
    19,45 €
  • Ogled izdelka
    The Art of Deception: Controlling the Human Element of Security(2003) KEVIN MITNICK
    Vezava: Mehka
    13,90 €
  • Ogled izdelka
    Learn Penetration Testing with Python 3.x(2024) ELGHALY, YEHIA
    Vezava: Mehka
    58,79 €
  • Ogled izdelka
    Fundamentals of Information Systems Security(2021) KIM, DAVID,SOLOMON, MICHAEL G.
    Vezava: Mehka
    100,06 €
  • Ogled izdelka
    Managing Risk In Information Systems(2020) GIBSON, DARRIL,IGONOR, ANDY
    Vezava: Mehka
    100,06 €
  • Ogled izdelka
    Web Application Security(2024) HOFFMAN, ANDREW
    In this revised and updated second edition, author Andrew Hoffman examines dozens of related topics, from the latest types of attacks and mitigations to threat modeling, the secure software development lifecycle (SSDL/SDLC), and more.
    Vezava: Mehka
    67,97 €
  • Ogled izdelka
    Network Security, Firewalls And Vpns(2020) STEWART, J. MICHAEL,KINSEY, DENISE
    Vezava: Mehka
    100,06 €
  • Ogled izdelka
    Defensive Security Handbook(2024) BROTHERSTON, LEE,BERLIN, AMANDA,REYOR III, WILLIAM F.
    Many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help y
    Vezava: Mehka
    67,97 €
  • Ogled izdelka
    Identity-Native Infrastructure Access Management(2023) KONTSEVOY, EV,SHAH, SAKSHYAM,CONRAD, PETER
    In this practical book, authors Ev Kontsevoy, Sakshyam Shah, and Peter Conrad break this topic down into manageable pieces. You'll discover how different parts of the approach fit together in a way that enables engineering teams to build more secure appli
    Vezava: Mehka
    51,40 €
  • Ogled izdelka
    Arista Warrior(2017) DONAHUE, GARY A.
    In this updated edition, renowned trainer, consultant, and technical author Gary A. Donahue (Network Warrior) provides an in-depth, objective guide to Arista’s products. You’ll learn why the company’s network switches, software products, and Extensible Op
    Vezava: Mehka
    82,08 €
  • Ogled izdelka
    Violent Python(2012) O'CONNOR, TJ
    Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frame
    Vezava: Mehka
    50,52 €
  • Ogled izdelka
    Unauthorised Access(2009) WIL ALLSOPP
    Vezava: Mehka
    41,69 €
  • Ogled izdelka
    Incident Response & Computer Forensics, Third Edition(2014) JASON LUTTGENS
    Vezava: Mehka
    64,13 €
  • Ogled izdelka
    Information Security Risk Assessment Toolkit(2012) TALABIS, MARK (CHIEF THREAT SCIENTIST OF ZVELO INC),MARTIN, JASON (IS THE VICE PRESIDENT OF CLOUD BUSINESS FOR FIREEYE, INC.)
    Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a
    Vezava: Mehka
    55,11 €
  • Ogled izdelka
    The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2E(2011) DAFYDD STUTTARD
    Vezava: Mehka
    59,00 €
  • Ogled izdelka
    Digital Forensics with Open Source Tools(2011) CARVEY, HARLAN (DFIR ANALYST, PRESENTER, AND OPEN-SOURCE TOOL AUTHOR),ALTHEIDE, CORY
    Focuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of f
    Vezava: Mehka
    69,74 €
  • Ogled izdelka
    24 Deadly Sins of Software Security(2010) HOWARD
    Vezava:
    78,24 €
  • Ogled izdelka
    Keys to the Kingdom(2012) OLLAM, DEVIANT (MEMBER OF THE BOARD OF DIRECTORS OF THE U.S. DIVISION OF TOOOL, THE OPEN ORGANISATION OF LOCKPICKERS AND SECURITY AUDITOR AND PENETRATION TESTING CONSULTANT WITH THE CORE GROUP)
    Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.
    Vezava: Mehka
    64,30 €
  • Ogled izdelka
    BTEC Level 3 National IT Student Book 1(2010) ANDERSON, KAREN,JARVIS, ALAN,KAYE, ALLEN,PHILLIPS, JENNY,SMITH, ANDREW,MCGILL, RICHARD
    BTEC and Heinemann have joined forces to provide BTEC's own resources to accompany the new BTEC Level 3 National IT specification, supporting learners every step of the way to BTEC success.
    Vezava: Mehka
    62,70 €
  • Ogled izdelka
    Basics of Cyber Warfare(2012) ANDRESS, JASON (CISSP, ISSAP, CISM, GPEN),WINTERFELD, STEVE ((CISSP, PMP, SANS GSEC, SIX SIGMA) HAS A STRONG TECHNICAL AND LEADERSHIP BACKGROUND IN CYBERSECURITY AND MILITARY INTELLIGENCE.)
    Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics a
    Vezava: Mehka
    30,31 €

Ostali so si ogledali tudi ...