200 rezultatov
-
Enterprise Security Architecture(2005) SHERWOOD, NICHOLASSecurity is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterpriseVezava: Trda186,45 € -
Understanding Linux Network Internals(2006) BENVENUTI, CHRISTIANA no-nonsense guide to Linux networking, which offers a clear view of the underlying concepts and teaches you to follow the C code that implements it. The topics include: system initialization, network interface card (NIC) device drivers, bridging, routinVezava: Mehka61,94 € -
Architecting the Cloud(2014) KAVIS, MICHAEL J.An expert guide to selecting the right cloud service model for your business Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloudVezava: Trda61,31 € -
Violent Python(2012) O'CONNOR, TJDemonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frameVezava: Mehka57,01 € -
IT Disaster Recovery Planning For Dummies(2008) GREGORY, PETER H. (AT&T WIRELESS SERVICES, WOODINVILLE, WASHINGTON)If you have a business or a nonprofit organization, or if you're the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital. But it's easy to put it off.Vezava: Mehka29,43 € -
-
Digital Forensics with Open Source Tools(2011) CARVEY, HARLAN (DFIR ANALYST, PRESENTER, AND OPEN-SOURCE TOOL AUTHOR),ALTHEIDE, CORYFocuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of fVezava: Mehka77,10 € -
Applied Network Security Monitoring(2014) SANDERS, CHRIS (SENIOR INFORMATION SECURITY ANALYST AT THE DOD, TRAINER, AND AUTHOR),SMITH, JASONA guide to becoming an NSM analyst from the ground up. It takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. It discusses the proper methods for data collection, and teaches you how toVezava: Mehka71,27 € -
BTEC Level 3 National IT Student Book 1(2010) ANDERSON, KAREN,JARVIS, ALAN,KAYE, ALLEN,PHILLIPS, JENNY,SMITH, ANDREW,MCGILL, RICHARDBTEC and Heinemann have joined forces to provide BTEC’s own resources to accompany the new BTEC Level 3 National IT specification, supporting learners every step of the way to BTEC success.Vezava: Mehka64,86 € -
Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots(2022) HUANG ET ALVezava: Mehka135,80 € -
Future Telco(2018)This book examines the extensive changes in markets, technologies and value chains that telecommunication companies are currently confronted with.Vezava: Trda114,83 € -
BTEC Nationals Information Technology Student Book + Activebook(2016) PHILLIPS, JENNY,JARVIS, ALAN,FISHPOOL, MARK,MCGILL, RICHARD,COOK, TIM,ATKINSON-BEAUMONT, DAVID58,59 € -
Marx and the Robots - Networked Production, AI and Human Labour(2022) FLORIAN BUTOLLOVezava: Mehka35,63 €










