205 rezultatov
- 
                  
                    
                  
                  
  
  
     Intelligence-Driven Incident Response(2023) BROWN, REBEKAH,ROBERTS, SCOTT JWith this updated edition, you'll learn the fundamentals of intelligence analysis including the best ways to incorporate these techniques into your incident response process.Vezava: Mehka68,39 € Intelligence-Driven Incident Response(2023) BROWN, REBEKAH,ROBERTS, SCOTT JWith this updated edition, you'll learn the fundamentals of intelligence analysis including the best ways to incorporate these techniques into your incident response process.Vezava: Mehka68,39 €
- 
                  
                    
                  
                  
  
  
     Agile Application Security(2017) SMITH, RICH,BRUNTON-SPALL, MICHAEL,BELL, LAURA,BIRD, JIMWritten by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences with agiVezava: Mehka61,94 € Agile Application Security(2017) SMITH, RICH,BRUNTON-SPALL, MICHAEL,BELL, LAURA,BIRD, JIMWritten by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences with agiVezava: Mehka61,94 €
- 
                  
                    
                  
                  
  
  
     Cybersecurity All-in-One For Dummies(2023) STEINBERG, JOSEPH,BEAVER, KEVIN,WINKLER, IRA,COOMBS, TEDVezava: Mehka53,26 € Cybersecurity All-in-One For Dummies(2023) STEINBERG, JOSEPH,BEAVER, KEVIN,WINKLER, IRA,COOMBS, TEDVezava: Mehka53,26 €
- 
                  
                    
                  
                  
  
  
     Modern Data Protection(2021) PRESTON, W. CURTISGive your organization data protection without the uncertainty and cost overruns experienced by your predecessors or other companies. To help you navigate the breadth and depth of this challenge, this book presents several solutions so you can determine wVezava: Mehka68,39 € Modern Data Protection(2021) PRESTON, W. CURTISGive your organization data protection without the uncertainty and cost overruns experienced by your predecessors or other companies. To help you navigate the breadth and depth of this challenge, this book presents several solutions so you can determine wVezava: Mehka68,39 €
- 
                  
                    
                  
                  
  
  
     Threat Modeling(2020) TARANDACH, IZAR,COLES, MATTHEW J.Threat modeling is one of the most essential--and most misunderstood--parts of the development lifecycle. Whether you're a security practitioner or a member of a development team, this book will help you gain a better understanding of how you can apply coVezava: Mehka68,39 € Threat Modeling(2020) TARANDACH, IZAR,COLES, MATTHEW J.Threat modeling is one of the most essential--and most misunderstood--parts of the development lifecycle. Whether you're a security practitioner or a member of a development team, this book will help you gain a better understanding of how you can apply coVezava: Mehka68,39 €
- 
                  
                    
                  
                  
  
  
     Container Security(2020) RICE, LIZTo facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. This practical book examines key underlying technologies to help developers, operators, and security professVezava: Mehka58,07 € Container Security(2020) RICE, LIZTo facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. This practical book examines key underlying technologies to help developers, operators, and security professVezava: Mehka58,07 €
- 
                  
                    
                  
                  
  
  
     Official (ISC)2 Guide to the CSSLP CBK(2013) PAUL, MANO (SECURISK SOLUTIONS, PFLUGERVILLE, TEXAS, USA)Vezava: Trda134,56 € Official (ISC)2 Guide to the CSSLP CBK(2013) PAUL, MANO (SECURISK SOLUTIONS, PFLUGERVILLE, TEXAS, USA)Vezava: Trda134,56 €
- 
                  
                    
                  
                  
  
  
     Keys to the Kingdom(2012) OLLAM, DEVIANT (MEMBER OF THE BOARD OF DIRECTORS OF THE U.S. DIVISION OF TOOOL, THE OPEN ORGANISATION OF LOCKPICKERS AND SECURITY AUDITOR AND PENETRATION TESTING CONSULTANT WITH THE CORE GROUP)Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.Vezava: Mehka71,27 € Keys to the Kingdom(2012) OLLAM, DEVIANT (MEMBER OF THE BOARD OF DIRECTORS OF THE U.S. DIVISION OF TOOOL, THE OPEN ORGANISATION OF LOCKPICKERS AND SECURITY AUDITOR AND PENETRATION TESTING CONSULTANT WITH THE CORE GROUP)Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.Vezava: Mehka71,27 €
- 
                  
                    
                  
                  
  
  
     Security Risk Management(2011) WHEELER, EVAN (OMGEO, BOSTON, MA, USA)Teaches you practical techniques that can be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. This book helps you break free from the so-called "best practices" argument by articulatingVezava: Mehka57,01 € Security Risk Management(2011) WHEELER, EVAN (OMGEO, BOSTON, MA, USA)Teaches you practical techniques that can be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. This book helps you break free from the so-called "best practices" argument by articulatingVezava: Mehka57,01 €
- 
                  
                    
                  
                  
  
  
      
- 
                  
                    
                  
                  
  
  
     Programming with STM32: Getting Started with the Nucleo Board and C/C++(2018) NORRIS, DONALDVezava: Mehka30,88 € Programming with STM32: Getting Started with the Nucleo Board and C/C++(2018) NORRIS, DONALDVezava: Mehka30,88 €
- 
                  
                    
                  
                  
  
  
     Evidence-Based Cybersecurity(2022) POMERLEAU, PIERRE-LUC,MAIMON, DAVIDThis book seeks to explain the foundation of the evidence-based cybersecurity approach, reviews its relevance in the context of existing security tools and policies, and the authors provide concrete examples of how adopting this approach could improve cybVezava: Trda110,24 € Evidence-Based Cybersecurity(2022) POMERLEAU, PIERRE-LUC,MAIMON, DAVIDThis book seeks to explain the foundation of the evidence-based cybersecurity approach, reviews its relevance in the context of existing security tools and policies, and the authors provide concrete examples of how adopting this approach could improve cybVezava: Trda110,24 €
 
     
     
     
      




 
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
          





 
              
             
              
             
              
             
              
            