191 rezultatov
-
Building a Cyber Risk Management Program(2023) ALLEN, BRIAN,BAPST, BRANDON,HICKS, TERRYIdeal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.Vezava: Mehka61,94 € -
Hacking Exposed 7(2012) MCCLURE, STUART,SCAMBRAY, JOEL,KURTZ, GEORGEThis fully updated edition of the longest-selling, most successful computer security book worldwide features an all-new “5 Deployments” approachVezava: Mehka70,97 € -
Enterprise Security Architecture(2005) SHERWOOD, NICHOLASSecurity is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterpriseVezava: Trda170,24 € -
Violent Python(2012) O'CONNOR, TJDemonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frameVezava: Mehka57,01 € -
Computer Security and Penetration Testing(2013) BASTA, ALFRED,BASTA, NADINE,BROWN, PHD, CISSP, CISA, MARY (CAPELLA UNIVERSITY)Offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the realm of network security. This title addresses how and why people attack computers and networks - equipping readers with the knowledge and techniquVezava: Mehka149,86 € -
-
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory(2014) MICHAEL HALEVezava: Mehka85,31 € -
Guide to Kernel Exploitation(2010) PERLA, ENRICO (KERNEL PROGRAMMER, ORACLE),OLDANI, MASSIMILIANO (SECURITY CONSULTANT, EMAZE NETWORKS)Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). This title discusses the most popular OS families - UNVezava: Mehka57,01 € -
Basics of Hacking and Penetration Testing(2013) ENGEBRETSON, PATRICK (DAKOTA STATE UNIVERSITY, MADISON, SD, USA)Serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. This title helps you learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetratiVezava: Mehka34,20 € -
New Technologies and National Security Challenges(2020)Explores national security challenges posed by new technologies and examines some ongoing efforts to understand and mitigate their potential negative effects. The authors, drawn from among a roster of international scholars, approach these issues from difVezava: Trda338,96 € -
Privacy(2020) GRUIS, LESLIE N.Argues that privacy is an individual right and democratic value worth preserving, even in a cyberized world. Greater privacy protections for US citizens will come as long as Americans remember how democracy and privacy sustain one another, and demonstrateVezava: Trda150,48 € -
Core Data Analysis: Summarization, Correlation, and Visualization(2019) MIRKIN, BORISVezava: Mehka84,21 €










