216 rezultatov
-
Poc||gtfo(2017) LAPHROAIG, MANULThis ultimate hacker's bible has only ever been available online or distributed at hacker conferences - until now.Vezava: Trda53,26 €
-
Rootkits and Bootkits(2019) MATROSOV, ALEX,RODIONOV, EUGENE,BRATUS, SERGEYA master class in malware evolution that will give you the techniques and tools necessary to counter sophisticated, advanced threats.Vezava: Mehka61,94 €
-
Building an Effective Security Program(2020) WILLIAMS, CHRIS,DONALDSON, SCOTT,SIEGEL, STANLEYVezava: Mehka73,50 €
-
Quantum Key Distribution(2021) WOLF, RAMONAThis textbook introduces the non-specialist reader to the concepts of quantum key distribution and presents an overview of state-of-the-art quantum communication protocols and applications.Vezava: Mehka59,86 €
-
Applied Cryptography(2015) SCHNEIER, BRUCEFrom the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyVezava: Trda74,86 €
-
Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing(2021)Focused on the latest mobile technologies, this book addresses the specific features (such as IoT) and their adoptions that are aiming to enable the excellence of business in the Industry 4.0.Vezava: Mehka39,55 €
-
Understanding the Digital World(2021) KERNIGHAN, BRIAN W.A brand-new edition of the popular introductory textbook that explores how computer hardware, software, and networks workComputers are everywhere. Some are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like tVezava: Mehka48,47 €
-
Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)(2020)Recent Advances in Security, Privacy and Trust for Internet-of-Things (IoT) and Cyber-Physical Systems (CPS) will discuss and present techniques and methodologies as well a wide range of examples and illustrations to effectively show the principles, algorVezava: Trda118,56 €
-
CompTIA Advanced Security Practitioner (CASP) CAS-002 Cert Guide(2015) ABERNATHY, ROBIN,MCMILLAN, TROY9,70 €
-
Exam Ref AZ-500 Microsoft Azure Security Technologies, 2/e(2022) DIOGENES, YURI,THOMAS, ORINVezava: Mehka52,50 €
-
Hands-On Ethical Hacking and Network Defense(2022) WILSON, ROB (WILLIS COLLEGE OF BUSINESS, HEALTHCARE AND TECHNOLOGY),SIMPSON, MICHAEL,ANTILL, NICHOLASVezava: Mehka96,67 €
-
Programming Bitcoin(0) SONG, JIMMYDive into Bitcoin technology with this hands-on guide from one of the leading teachers on Bitcoin and Bitcoin programming. Author Jimmy Song shows Python programmers and developers how to program a Bitcoin library from scratch.Vezava: Mehka82,59 €
-
Android Security Internals(2014) ELENKOV, NIKOLAYAndroid Security Internals delves into Android components and subsystems to give you a deep and complete understanding of the security internals of Android devices.Vezava: Mehka61,94 €
-
Big Data Analytics and Intelligence(2020)Big Data Analytics and Intelligence is essential reading for researchers and experts working in the fields of health care, data science, analytics, the internet of things, and information retrieval.Vezava: Trda75,69 €
-
Internet Password Logbook (Red Leatherette)(2018) EDITORS OF ROCK POINTPassword security is paramount in today’s world. Data security experts advise a hard copy of all difficult passwords, and this Internet Password Logbook is the perfect record for them.Vezava: Trda8,16 €