205 rezultatov
-
Software Supply Chain Security(2024) CROSSLEY, CASSIEThis practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain.Vezava: Mehka58,07 € -
Building a Cyber Risk Management Program(2023) ALLEN, BRIAN,BAPST, BRANDON,HICKS, TERRYIdeal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.Vezava: Mehka61,94 € -
Hacking Exposed 7(2012) MCCLURE, STUART,SCAMBRAY, JOEL,KURTZ, GEORGEThis fully updated edition of the longest-selling, most successful computer security book worldwide features an all-new “5 Deployments” approachVezava: Mehka70,97 € -
Enterprise Security Architecture(2005) SHERWOOD, NICHOLASSecurity is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterpriseVezava: Trda170,24 € -
Violent Python(2012) O'CONNOR, TJDemonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frameVezava: Mehka57,01 € -
Cryptanalysis(2000) GAINES, HELEN FOUCHEThorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts. Simple and advanced methods. 166 specimens to solve — with solutions.Vezava: Mehka18,91 € -
Computer Security and Penetration Testing(2013) BASTA, ALFRED,BASTA, NADINE,BROWN, PHD, CISSP, CISA, MARY (CAPELLA UNIVERSITY)Offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the realm of network security. This title addresses how and why people attack computers and networks - equipping readers with the knowledge and techniquVezava: Mehka149,86 € -
-
Guide to Kernel Exploitation(2010) PERLA, ENRICO (KERNEL PROGRAMMER, ORACLE),OLDANI, MASSIMILIANO (SECURITY CONSULTANT, EMAZE NETWORKS)Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). This title discusses the most popular OS families - UNVezava: Mehka57,01 € -
Digital Forensics with Open Source Tools(2011) CARVEY, HARLAN (DFIR ANALYST, PRESENTER, AND OPEN-SOURCE TOOL AUTHOR),ALTHEIDE, CORYFocuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of fVezava: Mehka77,10 € -
Basics of Hacking and Penetration Testing(2013) ENGEBRETSON, PATRICK (DAKOTA STATE UNIVERSITY, MADISON, SD, USA)Serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. This title helps you learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetratiVezava: Mehka34,20 € -
Basics of Cyber Warfare(2012) ANDRESS, JASON (CISSP, ISSAP, CISM, GPEN),WINTERFELD, STEVE ((CISSP, PMP, SANS GSEC, SIX SIGMA) HAS A STRONG TECHNICAL AND LEADERSHIP BACKGROUND IN CYBERSECURITY AND MILITARY INTELLIGENCE.)Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics aVezava: Mehka34,20 € -
New Technologies and National Security Challenges(2020)Explores national security challenges posed by new technologies and examines some ongoing efforts to understand and mitigate their potential negative effects. The authors, drawn from among a roster of international scholars, approach these issues from difVezava: Trda338,96 € -
Privacy(2020) GRUIS, LESLIE N.Argues that privacy is an individual right and democratic value worth preserving, even in a cyberized world. Greater privacy protections for US citizens will come as long as Americans remember how democracy and privacy sustain one another, and demonstrateVezava: Trda150,48 € -
Core Data Analysis: Summarization, Correlation, and Visualization(2019) MIRKIN, BORISVezava: Mehka84,21 €










