216 rezultatov
-
ISC2 Certified Cloud Security Professional (CCSP) Exam Guide(2023) VAN LAVIEREN, KIMVezava: Mehka60,81 €
-
Software Supply Chain Security(2024) CROSSLEY, CASSIEThis practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain.Vezava: Mehka58,07 €
-
Building a Cyber Risk Management Program(2023) ALLEN, BRIAN,BAPST, BRANDON,HICKS, TERRYIdeal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.Vezava: Mehka61,94 €
-
Hacking Exposed 7(2012) MCCLURE, STUART,SCAMBRAY, JOEL,KURTZ, GEORGEThis fully updated edition of the longest-selling, most successful computer security book worldwide features an all-new “5 Deployments” approachVezava: Mehka70,97 €
-
Enterprise Security Architecture(2005) SHERWOOD, NICHOLAS (CONSULTANT, ANAESTHESIA AND CRITICAL CARE MEDICINE, CITY HOSPITAL, BIRMIMGHAM, UK)Security is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterpriseVezava: Trda170,24 €
-
Violent Python(2012) O'CONNOR, TJDemonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frameVezava: Mehka57,01 €
-
Cryptanalysis(2000) GAINES, HELEN FOUCHEThorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts. Simple and advanced methods. 166 specimens to solve — with solutions.Vezava: Mehka18,91 €
-
Computer Security and Penetration Testing(2013) BASTA, ALFRED,BASTA, NADINE,BROWN, PHD, CISSP, CISA, MARY (CAPELLA UNIVERSITY)Offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the realm of network security. This title addresses how and why people attack computers and networks - equipping readers with the knowledge and techniquVezava: Mehka149,86 €
-
-
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory(2014) MICHAEL HALEVezava: Mehka85,31 €
-
Guide to Kernel Exploitation(2010) PERLA, ENRICO (KERNEL PROGRAMMER, ORACLE),OLDANI, MASSIMILIANO (SECURITY CONSULTANT, EMAZE NETWORKS)Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). This title discusses the most popular OS families - UNVezava: Mehka57,01 €
-
Digital Forensics with Open Source Tools(2011) CARVEY, HARLAN (DFIR ANALYST, PRESENTER, AND OPEN-SOURCE TOOL AUTHOR),ALTHEIDE, CORYFocuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of fVezava: Mehka77,10 €
-
Basics of Cyber Warfare(2012) ANDRESS, JASON (CISSP, ISSAP, CISM, GPEN),WINTERFELD, STEVE ((CISSP, PMP, SANS GSEC, SIX SIGMA) HAS A STRONG TECHNICAL AND LEADERSHIP BACKGROUND IN CYBERSECURITY AND MILITARY INTELLIGENCE.)Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics aVezava: Mehka34,20 €