242 rezultatov
-
Exam Ref MS-500 Microsoft 365 Security Administration(2021) FISHER, ED,CHAMBERLAIN, NATEVezava: Mehka44,78 €
FISHER, ED,CHAMBERLAIN, NATE
Exam Ref MS-500 Microsoft 365 Security Administration
Zaloga po trgovinah
Rezultati:
-
-
-
CompTIA Security+ Guide to Network Security Fundamentals(2020) CIAMPA, MARK (WESTERN KENTUCKY UNIVERSITY)Vezava: Mehka135,15 €
CIAMPA, MARK (WESTERN KENTUCKY UNIVERSITY)
CompTIA Security+ Guide to Network Security Fundamentals
Zaloga po trgovinah
Rezultati:
-
Internet Password Book(2021) EDITORS OF CHARTWELL BOOKSIn our modern, digital age, data security experts advise a hard copy of all difficult passwords; and this Internet Password Book is the perfect record for them.Vezava: Trda8,09 €
EDITORS OF CHARTWELL BOOKS
Internet Password Book
In our modern, digital age, data security experts advise a hard copy of all difficult passwords; and this Internet Password Book is the perfect record for them.
Zaloga po trgovinah
Rezultati:
-
Complete Guide for CISA Examination Preparation(2020) CASCARINO, RICHARD E.The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. Designed to help candidates pass the CISA exam easily, it also serves as an idealVezava: Mehka67,97 €
CASCARINO, RICHARD E.
Complete Guide for CISA Examination Preparation
The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. Designed to help candidates pass the CISA exam easily, it also serves as an ideal
Zaloga po trgovinah
Rezultati:
-
Security Chaos Engineering(2023) SHORTRIDGE, KELLYIn this pragmatic and comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of securing complex software systems. Using the principles and practices of security chaos engineering, software engineering teams willVezava: Mehka67,97 €
SHORTRIDGE, KELLY
Security Chaos Engineering
In this pragmatic and comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of securing complex software systems. Using the principles and practices of security chaos engineering, software engineering teams will
Zaloga po trgovinah
Rezultati:
-
Intelligence-Driven Incident Response(2023) BROWN, REBEKAH,ROBERTS, SCOTT JWith this updated edition, you'll learn the fundamentals of intelligence analysis including the best ways to incorporate these techniques into your incident response process.Vezava: Mehka67,97 €
BROWN, REBEKAH,ROBERTS, SCOTT J
Intelligence-Driven Incident Response
With this updated edition, you'll learn the fundamentals of intelligence analysis including the best ways to incorporate these techniques into your incident response process.
Zaloga po trgovinah
Rezultati:
-
Agile Application Security(2017) SMITH, RICH,BRUNTON-SPALL, MICHAEL,BELL, LAURA,BIRD, JIMWritten by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences with agiVezava: Mehka61,56 €
SMITH, RICH,BRUNTON-SPALL, MICHAEL,BELL, LAURA,BIRD, JIM
Agile Application Security
Written by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences with agi
Zaloga po trgovinah
Rezultati:
-
Security Risk Management for the Internet of Things - Technologies and Techniques for IoT Security, Privacy and Data Protection(2020)Introduces a set of novel risk assessment techniques and their role in the IoT security risk management process. Specifically, the book presents architectures and platforms for end-to-end security, including their implementation based on the edge/fog compVezava: Trda166,56 €
Security Risk Management for the Internet of Things - Technologies and Techniques for IoT Security, Privacy and Data Protection
Introduces a set of novel risk assessment techniques and their role in the IoT security risk management process. Specifically, the book presents architectures and platforms for end-to-end security, including their implementation based on the edge/fog comp
Zaloga po trgovinah
Rezultati:
-
Cybersecurity All-in-One For Dummies(2023) STEINBERG, JOSEPH,BEAVER, KEVIN,WINKLER, IRA,COOMBS, TEDVezava: Mehka52,79 €
STEINBERG, JOSEPH,BEAVER, KEVIN,WINKLER, IRA,COOMBS, TED
Cybersecurity All-in-One For Dummies
Zaloga po trgovinah
Rezultati:
-
Modern Data Protection(2021) PRESTON, W. CURTISGive your organization data protection without the uncertainty and cost overruns experienced by your predecessors or other companies. To help you navigate the breadth and depth of this challenge, this book presents several solutions so you can determine wVezava: Mehka67,97 €
PRESTON, W. CURTIS
Modern Data Protection
Give your organization data protection without the uncertainty and cost overruns experienced by your predecessors or other companies. To help you navigate the breadth and depth of this challenge, this book presents several solutions so you can determine w
Zaloga po trgovinah
Rezultati:
-
Threat Modeling(2020) TARANDACH, IZAR,COLES, MATTHEW J.Threat modeling is one of the most essential--and most misunderstood--parts of the development lifecycle. Whether you're a security practitioner or a member of a development team, this book will help you gain a better understanding of how you can apply coVezava: Mehka67,97 €
TARANDACH, IZAR,COLES, MATTHEW J.
Threat Modeling
Threat modeling is one of the most essential--and most misunderstood--parts of the development lifecycle. Whether you're a security practitioner or a member of a development team, this book will help you gain a better understanding of how you can apply co
Zaloga po trgovinah
Rezultati:
-
Container Security(2020) RICE, LIZTo facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. This practical book examines key underlying technologies to help developers, operators, and security professVezava: Mehka57,71 €
RICE, LIZ
Container Security
To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. This practical book examines key underlying technologies to help developers, operators, and security profess
Zaloga po trgovinah
Rezultati:
-
Crafting an Information Security Playbook(2015) BOLLINGER, JEFF,ENRIGHT, BRANDON,VALITES, MATTHEWWritten by members of Cisco's Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture.Vezava: Mehka55,57 €
BOLLINGER, JEFF,ENRIGHT, BRANDON,VALITES, MATTHEW
Crafting an Information Security Playbook
Written by members of Cisco's Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture.
Zaloga po trgovinah
Rezultati:
-
-
-
Official (ISC)2 Guide to the CSSLP CBK(2013) PAUL, MANO (SECURISK SOLUTIONS, PFLUGERVILLE, TEXAS, USA)Vezava: Trda135,68 €
PAUL, MANO (SECURISK SOLUTIONS, PFLUGERVILLE, TEXAS, USA)
Official (ISC)2 Guide to the CSSLP CBK
Zaloga po trgovinah
Rezultati:
-
-