242 rezultatov
-
Hardware Security(2018) BHUNIA, SWARUP (DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING, UNIVERSITY OF FLORIDA, GAINESVILLE, FL, USA),TEHRANIPOOR, MARK M., PH.D. (DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING, UNIVERSITY OF FLORIDA, GAINESVILLE, FL, USA)Vezava: Mehka116,07 €
BHUNIA, SWARUP (DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING, UNIVERSITY OF FLORIDA, GAINESVILLE, FL, USA),TEHRANIPOOR, MARK M., PH.D. (DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING, UNIVERSITY OF FLORIDA, GAINESVILLE, FL, USA)
Hardware Security
Zaloga po trgovinah
Rezultati:
-
Cyberpredators and Their Prey(2022) SHAPIRO, LAUREN R. (JOHN JAY COLLEGE, NEW YORK, USA)Cyberpredators and Their Prey examines cyberpredators from a multidisciplinary perspective utilizing psychology, criminal justice, law, and security principles to understand the criminal and the intended victim. It provides practical information on who tyVezava: Mehka71,23 €
SHAPIRO, LAUREN R. (JOHN JAY COLLEGE, NEW YORK, USA)
Cyberpredators and Their Prey
Cyberpredators and Their Prey examines cyberpredators from a multidisciplinary perspective utilizing psychology, criminal justice, law, and security principles to understand the criminal and the intended victim. It provides practical information on who ty
Zaloga po trgovinah
Rezultati:
-
Google Hacking for Penetration Testers(2015) GARDNER, BILL (BILL GARDNER OSCP, I-NET+, SECURITY+, ASST. PROF. AT MARSHALL UNIVERSITY),LONG, JOHNNY (SECURITY RESEARCHER, FOUNDER OF HACKERS FOR CHARITY),BROWN, JUSTIN (INFORMATION SECURITY PROFESSIONAL AT ONE WORLDS LAB)Vezava: Mehka69,74 €
GARDNER, BILL (BILL GARDNER OSCP, I-NET+, SECURITY+, ASST. PROF. AT MARSHALL UNIVERSITY),LONG, JOHNNY (SECURITY RESEARCHER, FOUNDER OF HACKERS FOR CHARITY),BROWN, JUSTIN (INFORMATION SECURITY PROFESSIONAL AT ONE WORLDS LAB)
Google Hacking for Penetration Testers
Zaloga po trgovinah
Rezultati:
-
Windows Performance Analysis Field Guide(2014) HUFFMAN, CLINT (SENIOR PREMIER FIELD ENGINEER AT MICROSOFT)Vezava: Mehka63,72 €
HUFFMAN, CLINT (SENIOR PREMIER FIELD ENGINEER AT MICROSOFT)
Windows Performance Analysis Field Guide
Zaloga po trgovinah
Rezultati:
-
Internet of Things(2020) SHACKELFORD, SCOTT J. (CYBERSECURITY PROGRAM CHAIR AND DIRECTOR, OSTROM WORKSHOP PROGRAM ON CYBERSECURITY AND INTERNET GOVERNANCE, CYBERSECURITY PROGRAM CHAIR AND DIRECTOR, OSTROM WORKSHOP PROGRAM ON CYBERSECURITY AND INTERNET GOVERNANCE, INDIANA UNIVERSITY BLOOMINGTON)Vezava: Mehka15,27 €
SHACKELFORD, SCOTT J. (CYBERSECURITY PROGRAM CHAIR AND DIRECTOR, OSTROM WORKSHOP PROGRAM ON CYBERSECURITY AND INTERNET GOVERNANCE, CYBERSECURITY PROGRAM CHAIR AND DIRECTOR, OSTROM WORKSHOP PROGRAM ON CYBERSECURITY AND INTERNET GOVERNANCE, INDIANA UNIVERSITY BLOOMINGTON)
Internet of Things
Zaloga po trgovinah
Rezultati:
-
Industry Unbound(2021) WALDMAN, ARI EZRA (NORTHEASTERN UNIVERSITY, BOSTON)Using rich first-hand sources, Waldman provides an unprecedented account of how tech companies undermine privacy law from the inside. Industry Unbound brings together seemingly separate issues–discourse, law, and design–to reveal tech companies' strategieVezava: Trda34,45 €
WALDMAN, ARI EZRA (NORTHEASTERN UNIVERSITY, BOSTON)
Industry Unbound
Using rich first-hand sources, Waldman provides an unprecedented account of how tech companies undermine privacy law from the inside. Industry Unbound brings together seemingly separate issues–discourse, law, and design–to reveal tech companies' strategie
Zaloga po trgovinah
Rezultati:
-
CISM Certified Information Security Manager Study Guide(2022) CHAPPLE, MIKE (UNIVERSITY OF NOTRE DAME)Vezava: Mehka64,14 €
CHAPPLE, MIKE (UNIVERSITY OF NOTRE DAME)
CISM Certified Information Security Manager Study Guide
Zaloga po trgovinah
Rezultati:
-
Network Security Assessment 3e(2017) MCNAB, CHRISHow secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. With the third edition of this practical book, you'll learn how to perform network-based penetration testingVezava: Mehka55,57 €
MCNAB, CHRIS
Network Security Assessment 3e
How secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. With the third edition of this practical book, you'll learn how to perform network-based penetration testing
Zaloga po trgovinah
Rezultati:
-
Introduction to Machine Learning with Applications in Information Security(2017) MARK STAMPVezava: Trda96,67 €
MARK STAMP
Introduction to Machine Learning with Applications in Information Security
Zaloga po trgovinah
Rezultati:
-
(R)evolution(2020) QUENOY, IRINA DUPresents a series of think-pieces about the security challenges of the present, both in the realm of cyberspace and otherwise, with a particular consideration of the promise and possible negative effects of new digital technologies.Vezava: Trda359,69 €
QUENOY, IRINA DU
(R)evolution
Presents a series of think-pieces about the security challenges of the present, both in the realm of cyberspace and otherwise, with a particular consideration of the promise and possible negative effects of new digital technologies.
Zaloga po trgovinah
Rezultati:
-
-
Freedom to Think(2022) ALEGRE, SUSIEThe story of our most fundamental human right - and why it is in grave dangerVezava: Trda27,79 €
ALEGRE, SUSIE
Freedom to Think
The story of our most fundamental human right - and why it is in grave danger
Zaloga po trgovinah
Rezultati:
-
-
-
-
Intercept(2016) CORERA, GORDONFrom Bletchley Park to cyber-attacks in the twenty-first century, this is the untold story of computers and spies: past, present and futureVezava: Mehka18,05 €
CORERA, GORDON
Intercept
From Bletchley Park to cyber-attacks in the twenty-first century, this is the untold story of computers and spies: past, present and future
Zaloga po trgovinah
Rezultati:
-
Data Protection Officer(2021) JOHNSSEN, FILIP,EDVARDSEN, SOFIAThis practical guide to the DPO role encompasses the key activities you’ll need to manage to succeed as a DPO. Coverage includes data protection fundamentals and processes, understanding risk and relevant standards, frameworks and tools, with DPO tips alsVezava: Mehka34,44 €
JOHNSSEN, FILIP,EDVARDSEN, SOFIA
Data Protection Officer
This practical guide to the DPO role encompasses the key activities you’ll need to manage to succeed as a DPO. Coverage includes data protection fundamentals and processes, understanding risk and relevant standards, frameworks and tools, with DPO tips als
Zaloga po trgovinah
Rezultati:
-
The Perfect Police State - An Undercover Odyssey into China's Terrifying Surveillance Dystopia of the Future(2021) GEOFFREY CAINVezava: Trda34,45 €
GEOFFREY CAIN
The Perfect Police State - An Undercover Odyssey into China's Terrifying Surveillance Dystopia of the Future
Zaloga po trgovinah
Rezultati:
-
-
Ethical Hacking and Penetration Testing Guide(2014) BALOCH, RAFAYRequiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end.Vezava: Mehka96,67 €
BALOCH, RAFAY
Ethical Hacking and Penetration Testing Guide
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end.
Zaloga po trgovinah
Rezultati: