242 rezultatov
-
-
Keys to the Kingdom(2012) OLLAM, DEVIANT (MEMBER OF THE BOARD OF DIRECTORS OF THE U.S. DIVISION OF TOOOL, THE OPEN ORGANISATION OF LOCKPICKERS AND SECURITY AUDITOR AND PENETRATION TESTING CONSULTANT WITH THE CORE GROUP)Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.Vezava: Mehka64,30 €
OLLAM, DEVIANT (MEMBER OF THE BOARD OF DIRECTORS OF THE U.S. DIVISION OF TOOOL, THE OPEN ORGANISATION OF LOCKPICKERS AND SECURITY AUDITOR AND PENETRATION TESTING CONSULTANT WITH THE CORE GROUP)
Keys to the Kingdom
Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.
Zaloga po trgovinah
Rezultati:
-
Information Security Risk Assessment Toolkit(2012) TALABIS, MARK (CHIEF THREAT SCIENTIST OF ZVELO INC),MARTIN, JASON (IS THE VICE PRESIDENT OF CLOUD BUSINESS FOR FIREEYE, INC.)Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing aVezava: Mehka55,11 €
TALABIS, MARK (CHIEF THREAT SCIENTIST OF ZVELO INC),MARTIN, JASON (IS THE VICE PRESIDENT OF CLOUD BUSINESS FOR FIREEYE, INC.)
Information Security Risk Assessment Toolkit
Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a
Zaloga po trgovinah
Rezultati:
-
Security Risk Management(2011) WHEELER, EVAN (OMGEO, BOSTON, MA, USA)Teaches you practical techniques that can be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. This book helps you break free from the so-called "best practices" argument by articulatingVezava: Mehka50,52 €
WHEELER, EVAN (OMGEO, BOSTON, MA, USA)
Security Risk Management
Teaches you practical techniques that can be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. This book helps you break free from the so-called "best practices" argument by articulating
Zaloga po trgovinah
Rezultati:
-
Introduction to Computer Security(2013) GOODRICH, MICHAEL,TAMASSIA, ROBERTOVezava: Mehka134,64 €
GOODRICH, MICHAEL,TAMASSIA, ROBERTO
Introduction to Computer Security
Zaloga po trgovinah
Rezultati:
-
-
-
SSCP Systems Security Certified Practitioner Practice Exams(2019) MITROPOULOS, NICKVezava: Mehka43,07 €
MITROPOULOS, NICK
SSCP Systems Security Certified Practitioner Practice Exams
Zaloga po trgovinah
Rezultati:
-
Programming with STM32: Getting Started with the Nucleo Board and C/C++(2018) NORRIS, DONALDVezava: Mehka29,85 €
NORRIS, DONALD
Programming with STM32: Getting Started with the Nucleo Board and C/C++
Zaloga po trgovinah
Rezultati:
-
Digital Forensics Explained(2021)Digital Forensics Explained, 2nd edition, covers the full life cycle of conducting a mobile and computer digital forensic examinations including planning and performing an investigation as well as report writing and testifying.Vezava: Mehka89,88 €
Digital Forensics Explained
Digital Forensics Explained, 2nd edition, covers the full life cycle of conducting a mobile and computer digital forensic examinations including planning and performing an investigation as well as report writing and testifying.
Zaloga po trgovinah
Rezultati:
-
Evidence-Based Cybersecurity(2022) POMERLEAU, PIERRE-LUC,MAIMON, DAVIDThis book seeks to explain the foundation of the evidence-based cybersecurity approach, reviews its relevance in the context of existing security tools and policies, and the authors provide concrete examples of how adopting this approach could improve cybVezava: Trda106,84 €
POMERLEAU, PIERRE-LUC,MAIMON, DAVID
Evidence-Based Cybersecurity
This book seeks to explain the foundation of the evidence-based cybersecurity approach, reviews its relevance in the context of existing security tools and policies, and the authors provide concrete examples of how adopting this approach could improve cyb
Zaloga po trgovinah
Rezultati:
-
Security Awareness Design in the New Normal Age(2022) GOUCHER, WENDY F.This book will primarily consider the problem of hitting that ‘Sweet Spot’ in the age of ‘New Normal working’, where knowledge about secure practice is not only understood and remembered, but also reliably put into practice – even when working alone. ThisVezava: Trda101,76 €
GOUCHER, WENDY F.
Security Awareness Design in the New Normal Age
This book will primarily consider the problem of hitting that ‘Sweet Spot’ in the age of ‘New Normal working’, where knowledge about secure practice is not only understood and remembered, but also reliably put into practice – even when working alone. This
Zaloga po trgovinah
Rezultati:
-
Security as Code(2023) DAS, BK SARTHAK,CHU, VIRGINIAIn this book, authors BK Sarthak Das and Virginia Chu demonstrate how to use this methodology to secure any application and infrastructure you want to deploy. With Security as Code, you'll learn how to create a secure containerized application with KubernVezava: Mehka57,71 €
DAS, BK SARTHAK,CHU, VIRGINIA
Security as Code
In this book, authors BK Sarthak Das and Virginia Chu demonstrate how to use this methodology to secure any application and infrastructure you want to deploy. With Security as Code, you'll learn how to create a secure containerized application with Kubern
Zaloga po trgovinah
Rezultati:
-
Security and Microservice Architecture on AWS(2021) RAJE, GUARAVAuthor Gaurav Raje shows cloud solution architects and software developers with AWS experience how to build highly secure systems on AWS without increasing overhead.Vezava: Mehka67,97 €
RAJE, GUARAV
Security and Microservice Architecture on AWS
Author Gaurav Raje shows cloud solution architects and software developers with AWS experience how to build highly secure systems on AWS without increasing overhead.
Zaloga po trgovinah
Rezultati:
-
97 Things Every Information Security Professional Should Know(2021) MORILLO, CHRISTINAIn this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn how to expand your skills and solve common issues by working through evVezava: Mehka55,57 €
MORILLO, CHRISTINA
97 Things Every Information Security Professional Should Know
In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn how to expand your skills and solve common issues by working through ev
Zaloga po trgovinah
Rezultati:
-
-
-
Principles of Information Security(2021) MATTORD, HERBERT (MICHAEL J. COLES COLLEGE OF BUSINESS, KENNESAW STATE UNIVERSITY),WHITMAN, MICHAEL (INSTITUTE FOR CYBERSECURITY WORKFORCE DEVELOPMENT, KENNESAW STATE UNIVERSITY)Vezava: Mehka133,35 €
MATTORD, HERBERT (MICHAEL J. COLES COLLEGE OF BUSINESS, KENNESAW STATE UNIVERSITY),WHITMAN, MICHAEL (INSTITUTE FOR CYBERSECURITY WORKFORCE DEVELOPMENT, KENNESAW STATE UNIVERSITY)
Principles of Information Security
Zaloga po trgovinah
Rezultati:
-
Cybersecurity Essentials(2018) BROOKS, CHARLES J.,GROW, CHRISTOPHER,CRAIG, PHILIP A., JR.,SHORT, DONALDAn accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications.Vezava: Mehka45,86 €
BROOKS, CHARLES J.,GROW, CHRISTOPHER,CRAIG, PHILIP A., JR.,SHORT, DONALD
Cybersecurity Essentials
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications.
Zaloga po trgovinah
Rezultati:
-
Deploying Secure Containers for Training and Development(2015) DALZIEL, HENRY (FOUNDER, CONCISE AC LTD, UK),SCHIPP, JONVezava: Mehka45,01 €
DALZIEL, HENRY (FOUNDER, CONCISE AC LTD, UK),SCHIPP, JON
Deploying Secure Containers for Training and Development
Zaloga po trgovinah
Rezultati: