242 rezultatov
-
-
-
Effective Vulnerability Management(2024) HUGHES, CHRIS (CAPITOL TECHNOLOGY UNIVERSITY; UNIVERSITY OF MARYLAND GLOBAL CAMPUS),ROBINSON, NIKKI (CAPITOL TECHNOLOGY UNIVERSITY)Vezava: Mehka37,51 €
HUGHES, CHRIS (CAPITOL TECHNOLOGY UNIVERSITY; UNIVERSITY OF MARYLAND GLOBAL CAMPUS),ROBINSON, NIKKI (CAPITOL TECHNOLOGY UNIVERSITY)
Effective Vulnerability Management
Zaloga po trgovinah
Rezultati:
-
-
ISC2 Certified Cloud Security Professional (CCSP) Exam Guide(2023) VAN LAVIEREN, KIMVezava: Mehka58,79 €
VAN LAVIEREN, KIM
ISC2 Certified Cloud Security Professional (CCSP) Exam Guide
Zaloga po trgovinah
Rezultati:
-
-
Hyperautomation with Generative AI(2023) SINGH GILL, NAVDEEP,KAUR, JAGREETVezava: Mehka64,30 €
SINGH GILL, NAVDEEP,KAUR, JAGREET
Hyperautomation with Generative AI
Zaloga po trgovinah
Rezultati:
-
Secure Multiparty Computation and Secret Sharing(2015) CRAMER, RONALD (STICHTING CENTRUM VOOR WISKUNDE EN INFORMATICA (CWI), AMSTERDAM),DAMGARD, IVAN BJERRE (AARHUS UNIVERSITET, DENMARK),NIELSEN, JESPER BUUS (AARHUS UNIVERSITET, DENMARK)This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation and secret sharing. The authors present feasibility results from the last 30 years, generalizations to arbitrary access structures,Vezava: Trda111,93 €
CRAMER, RONALD (STICHTING CENTRUM VOOR WISKUNDE EN INFORMATICA (CWI), AMSTERDAM),DAMGARD, IVAN BJERRE (AARHUS UNIVERSITET, DENMARK),NIELSEN, JESPER BUUS (AARHUS UNIVERSITET, DENMARK)
Secure Multiparty Computation and Secret Sharing
This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation and secret sharing. The authors present feasibility results from the last 30 years, generalizations to arbitrary access structures,
Zaloga po trgovinah
Rezultati:
-
Official (ISC)2 Guide to the CAP CBK(2012) HOWARD, PATRICK D. (CHIEF INFORMATION SECURITY OFFICER, NUCLEAR REGULATORY COMMISSION, USA)Demonstrates the effectiveness of certification and accreditation as a risk management methodology for IT systems in public and private organizations. This work provides security professionals with an overview of C&A components, showing them how to documeVezava: Trda118,72 €
HOWARD, PATRICK D. (CHIEF INFORMATION SECURITY OFFICER, NUCLEAR REGULATORY COMMISSION, USA)
Official (ISC)2 Guide to the CAP CBK
Demonstrates the effectiveness of certification and accreditation as a risk management methodology for IT systems in public and private organizations. This work provides security professionals with an overview of C&A components, showing them how to docume
Zaloga po trgovinah
Rezultati:
-
Software Supply Chain Security(2024) CROSSLEY, CASSIEThis practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain.Vezava: Mehka57,71 €
CROSSLEY, CASSIE
Software Supply Chain Security
This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain.
Zaloga po trgovinah
Rezultati:
-
Building a Cyber Risk Management Program(2023) ALLEN, BRIAN,BAPST, BRANDON,HICKS, TERRYIdeal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.Vezava: Mehka61,56 €
ALLEN, BRIAN,BAPST, BRANDON,HICKS, TERRY
Building a Cyber Risk Management Program
Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.
Zaloga po trgovinah
Rezultati:
-
Hacking Exposed 7(2012) MCCLURE, STUART,SCAMBRAY, JOEL,KURTZ, GEORGEThis fully updated edition of the longest-selling, most successful computer security book worldwide features an all-new “5 Deployments” approachVezava: Mehka70,54 €
MCCLURE, STUART,SCAMBRAY, JOEL,KURTZ, GEORGE
Hacking Exposed 7
This fully updated edition of the longest-selling, most successful computer security book worldwide features an all-new “5 Deployments” approach
Zaloga po trgovinah
Rezultati:
-
Enterprise Security Architecture(2005) SHERWOOD, NICHOLASSecurity is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterpriseVezava: Trda157,49 €
SHERWOOD, NICHOLAS
Enterprise Security Architecture
Security is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterprise
Zaloga po trgovinah
Rezultati:
-
-
-
-
Violent Python(2012) O'CONNOR, TJDemonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frameVezava: Mehka50,52 €
O'CONNOR, TJ
Violent Python
Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frame
Zaloga po trgovinah
Rezultati:
-
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers(2005) K.D. MITNICKVezava: Mehka48,63 €
K.D. MITNICK
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Zaloga po trgovinah
Rezultati:
-
Computer Security and Penetration Testing(2013) BASTA, ALFRED,BASTA, NADINE,BROWN, PHD, CISSP, CISA, MARY (CAPELLA UNIVERSITY)Offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the realm of network security. This title addresses how and why people attack computers and networks - equipping readers with the knowledge and techniquVezava: Mehka140,56 €
BASTA, ALFRED,BASTA, NADINE,BROWN, PHD, CISSP, CISA, MARY (CAPELLA UNIVERSITY)
Computer Security and Penetration Testing
Offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the realm of network security. This title addresses how and why people attack computers and networks - equipping readers with the knowledge and techniqu
Zaloga po trgovinah
Rezultati:
-