245 rezultatov

  • Ogled izdelka
    BGP(2002) IIJITSCH VAN BEIJNUM
    This title focuses on the use of BGP (Border Gateway Protocol) to create reliable Internet connections. BGP makes it possible for ISPs to connect to each other and for customers to connect to more than one ISP.
    Vezava: Mehka
    44,85 €
  • Ogled izdelka
    Enterprise Security Architecture(2005) SHERWOOD, NICHOLAS (CONSULTANT, ANAESTHESIA AND CRITICAL CARE MEDICINE, CITY HOSPITAL, BIRMIMGHAM, UK)
    Security is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterprise
    Vezava: Trda
    170,24 €
  • Ogled izdelka
    Understanding Linux Network Internals(2006) BENVENUTI, CHRISTIAN
    A no-nonsense guide to Linux networking, which offers a clear view of the underlying concepts and teaches you to follow the C code that implements it. The topics include: system initialization, network interface card (NIC) device drivers, bridging, routin
    Vezava: Mehka
    61,94 €
  • Ogled izdelka
    Cisco IOS Cookbook(2007) DOOLEY, KEVIN
    Featuring sections on MPLS, Security, IPv6, and IP Mobility, this book presents solutions to common configuration problems, including: configuring interfaces of many types, from serial to ATM and Frame Relay; configuring all of the common IP routing proto
    Vezava: Mehka
    61,94 €
  • Ogled izdelka
    Computer Security 3E(2010) DIETER GOLLMANN
    Vezava: Mehka
    88,52 €
  • Ogled izdelka
    Architecting the Cloud(2014) KAVIS, MICHAEL J.
    An expert guide to selecting the right cloud service model for your business Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud
    Vezava: Trda
    61,31 €
  • Ogled izdelka
    Violent Python(2012) O'CONNOR, TJ
    Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frame
    Vezava: Mehka
    57,01 €
  • Ogled izdelka
    Practical Microservices(2020) GARAFOLO, ETHAN
    Vezava: Mehka
    70,32 €
  • Ogled izdelka
  • Ogled izdelka
    IT Disaster Recovery Planning For Dummies(2008) GREGORY, PETER H. (AT&T WIRELESS SERVICES, WOODINVILLE, WASHINGTON)
    If you have a business or a nonprofit organization, or if you're the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital. But it's easy to put it off.
    Vezava: Mehka
    29,43 €
  • Ogled izdelka
    Cryptography Engineering(2010) KOHNO
    Vezava: Mehka
    58,08 €
  • Ogled izdelka
    Incident Response & Computer Forensics, Third Edition(2014) JASON LUTTGENS
    Vezava: Mehka
    64,52 €
  • Ogled izdelka
    Networks: A Very Short Introduction(2012) GUIDO CALDARELLI
    Vezava: Mehka
    14,01 €
  • Ogled izdelka
    Digital Forensics with Open Source Tools(2011) CARVEY, HARLAN (DFIR ANALYST, PRESENTER, AND OPEN-SOURCE TOOL AUTHOR),ALTHEIDE, CORY
    Focuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of f
    Vezava: Mehka
    77,10 €
  • Ogled izdelka
    24 Deadly Sins of Software Security(2010) HOWARD
    Vezava:
    78,72 €
  • Ogled izdelka
    Keys to the Kingdom(2012) OLLAM, DEVIANT (MEMBER OF THE BOARD OF DIRECTORS OF THE U.S. DIVISION OF TOOOL, THE OPEN ORGANISATION OF LOCKPICKERS AND SECURITY AUDITOR AND PENETRATION TESTING CONSULTANT WITH THE CORE GROUP)
    Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.
    Vezava: Mehka
    71,27 €
  • Ogled izdelka
    Applied Network Security Monitoring(2014) SANDERS, CHRIS (SENIOR INFORMATION SECURITY ANALYST AT THE DOD, TRAINER, AND AUTHOR),SMITH, JASON
    A guide to becoming an NSM analyst from the ground up. It takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. It discusses the proper methods for data collection, and teaches you how to
    Vezava: Mehka
    71,27 €
  • Ogled izdelka
    BTEC Level 3 National IT Student Book 1(2010) ANDERSON, KAREN,JARVIS, ALAN,KAYE, ALLEN,PHILLIPS, JENNY,SMITH, ANDREW,MCGILL, RICHARD
    BTEC and Heinemann have joined forces to provide BTEC’s own resources to accompany the new BTEC Level 3 National IT specification, supporting learners every step of the way to BTEC success.
    Vezava: Mehka
    64,86 €
  • Ogled izdelka
    Basics of Cyber Warfare(2012) ANDRESS, JASON (CISSP, ISSAP, CISM, GPEN),WINTERFELD, STEVE ((CISSP, PMP, SANS GSEC, SIX SIGMA) HAS A STRONG TECHNICAL AND LEADERSHIP BACKGROUND IN CYBERSECURITY AND MILITARY INTELLIGENCE.)
    Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics a
    Vezava: Mehka
    34,20 €
  • Ogled izdelka
    TCP/IP Sockets in C(2009) DONAHOO, MICHAEL J. (BAYLOR UNIVERSITY, WACO, TX, USA),CALVERT, KENNETH L. (UNIVERSITY OF KENTUCKY, LEXINGTON, KY, USA)
    Helps you to gain the knowledge and skills needed to develop web-based applications. This book features tutorial-based approach that enables the reader to master the tasks and techniques essential to the various client-server projects using sockets in C.
    Vezava: Mehka
    44,54 €

Ostali so si ogledali tudi ...