205 rezultatov
- 
                  
                    
                  
                  
  
  
     Applied Cryptography(2015) SCHNEIER, BRUCEFrom the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyVezava: Trda74,86 € Applied Cryptography(2015) SCHNEIER, BRUCEFrom the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyVezava: Trda74,86 €
- 
                  
                    
                  
                  
  
  
     Understanding the Digital World(2021) KERNIGHAN, BRIAN W.A brand-new edition of the popular introductory textbook that explores how computer hardware, software, and networks workComputers are everywhere. Some are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like tVezava: Mehka48,47 € Understanding the Digital World(2021) KERNIGHAN, BRIAN W.A brand-new edition of the popular introductory textbook that explores how computer hardware, software, and networks workComputers are everywhere. Some are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like tVezava: Mehka48,47 €
- 
                  
                    
                  
                  
  
  
     Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)(2020)Recent Advances in Security, Privacy and Trust for Internet-of-Things (IoT) and Cyber-Physical Systems (CPS) will discuss and present techniques and methodologies as well a wide range of examples and illustrations to effectively show the principles, algorVezava: Trda118,56 € Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)(2020)Recent Advances in Security, Privacy and Trust for Internet-of-Things (IoT) and Cyber-Physical Systems (CPS) will discuss and present techniques and methodologies as well a wide range of examples and illustrations to effectively show the principles, algorVezava: Trda118,56 €
- 
                  
                    
                  
                  
  
  
     CompTIA Advanced Security Practitioner (CASP) CAS-002 Cert Guide(2015) ABERNATHY, ROBIN,MCMILLAN, TROY9,70 € CompTIA Advanced Security Practitioner (CASP) CAS-002 Cert Guide(2015) ABERNATHY, ROBIN,MCMILLAN, TROY9,70 €
- 
                  
                    
                  
                  
  
  
     Exam Ref AZ-500 Microsoft Azure Security Technologies, 2/e(2022) DIOGENES, YURI,THOMAS, ORINVezava: Mehka52,50 € Exam Ref AZ-500 Microsoft Azure Security Technologies, 2/e(2022) DIOGENES, YURI,THOMAS, ORINVezava: Mehka52,50 €
- 
                  
                    
                  
                  
  
  
     CompTIA PenTest+ Study Guide(2021) CHAPPLE, MIKE (UNIVERSITY OF NOTRE DAME),SEIDL, DAVID (MIAMI UNIVERSITY)Vezava: Mehka78,09 € CompTIA PenTest+ Study Guide(2021) CHAPPLE, MIKE (UNIVERSITY OF NOTRE DAME),SEIDL, DAVID (MIAMI UNIVERSITY)Vezava: Mehka78,09 €
- 
                  
                    
                  
                  
  
  
     Hands-On Ethical Hacking and Network Defense(2022) WILSON, ROB (WILLIS COLLEGE OF BUSINESS, HEALTHCARE AND TECHNOLOGY),SIMPSON, MICHAEL,ANTILL, NICHOLASVezava: Mehka96,67 € Hands-On Ethical Hacking and Network Defense(2022) WILSON, ROB (WILLIS COLLEGE OF BUSINESS, HEALTHCARE AND TECHNOLOGY),SIMPSON, MICHAEL,ANTILL, NICHOLASVezava: Mehka96,67 €
- 
                  
                    
                  
                  
  
  
     Programming Bitcoin(0) SONG, JIMMYDive into Bitcoin technology with this hands-on guide from one of the leading teachers on Bitcoin and Bitcoin programming. Author Jimmy Song shows Python programmers and developers how to program a Bitcoin library from scratch.Vezava: Mehka82,59 € Programming Bitcoin(0) SONG, JIMMYDive into Bitcoin technology with this hands-on guide from one of the leading teachers on Bitcoin and Bitcoin programming. Author Jimmy Song shows Python programmers and developers how to program a Bitcoin library from scratch.Vezava: Mehka82,59 €
- 
                  
                    
                  
                  
  
  
     Android Security Internals(2014) ELENKOV, NIKOLAYAndroid Security Internals delves into Android components and subsystems to give you a deep and complete understanding of the security internals of Android devices.Vezava: Mehka61,94 € Android Security Internals(2014) ELENKOV, NIKOLAYAndroid Security Internals delves into Android components and subsystems to give you a deep and complete understanding of the security internals of Android devices.Vezava: Mehka61,94 €
- 
                  
                    
                  
                  
  
  
     Big Data Analytics and Intelligence(2020)Big Data Analytics and Intelligence is essential reading for researchers and experts working in the fields of health care, data science, analytics, the internet of things, and information retrieval.Vezava: Trda75,69 € Big Data Analytics and Intelligence(2020)Big Data Analytics and Intelligence is essential reading for researchers and experts working in the fields of health care, data science, analytics, the internet of things, and information retrieval.Vezava: Trda75,69 €
- 
                  
                    
                  
                  
  
  
     Internet Password Logbook (Red Leatherette)(2018) EDITORS OF ROCK POINTPassword security is paramount in today’s world. Data security experts advise a hard copy of all difficult passwords, and this Internet Password Logbook is the perfect record for them.Vezava: Trda8,16 € Internet Password Logbook (Red Leatherette)(2018) EDITORS OF ROCK POINTPassword security is paramount in today’s world. Data security experts advise a hard copy of all difficult passwords, and this Internet Password Logbook is the perfect record for them.Vezava: Trda8,16 €
- 
                  
                    
                  
                  
  
  
     Learning Kali Linux(2018) MESSIER, RICThis practical book covers Kali's expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You'll also explore the vulnerabilities that make those tests necessary.Vezava: Mehka86,49 € Learning Kali Linux(2018) MESSIER, RICThis practical book covers Kali's expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You'll also explore the vulnerabilities that make those tests necessary.Vezava: Mehka86,49 €
- 
                  
                    
                  
                  
  
  
     Information Risk Management(2021) SUTTON, DAVIDInformation risk management (IRM) is about identifying, assessing, prioritising and treating risks to keep information secure and available. This book provides practical guidance to the principles and development of a strategic approach to an IRM programmVezava: Mehka73,82 € Information Risk Management(2021) SUTTON, DAVIDInformation risk management (IRM) is about identifying, assessing, prioritising and treating risks to keep information secure and available. This book provides practical guidance to the principles and development of a strategic approach to an IRM programmVezava: Mehka73,82 €
- 
                  
                    
                  
                  
  
  
     Data Protection and Compliance(2021) ROOM, STEWARTThis comprehensive guide for those with little or no legal knowledge provides detailed analysis of current data protection laws. It enables the reader to operationalise a truly risk-based approach to data protection and compliance, beyond just emphasis onVezava: Mehka82,02 € Data Protection and Compliance(2021) ROOM, STEWARTThis comprehensive guide for those with little or no legal knowledge provides detailed analysis of current data protection laws. It enables the reader to operationalise a truly risk-based approach to data protection and compliance, beyond just emphasis onVezava: Mehka82,02 €
- 
                  
                    
                  
                  
  
  
     Security Operations in Practice(2020) SHEWARD, MIKEThis book walks you through how to establish and grow a strong security operations team, including hiring the right people, understanding the business the team is working to protect, knowing when to build a tool rather than buy, and crafting procedures thVezava: Mehka62,36 € Security Operations in Practice(2020) SHEWARD, MIKEThis book walks you through how to establish and grow a strong security operations team, including hiring the right people, understanding the business the team is working to protect, knowing when to build a tool rather than buy, and crafting procedures thVezava: Mehka62,36 €
- 
                  
                    
                  
                  
  
  
     Data Strategy(2021) WALLIS, IANA well thought out, fit-for-purpose data strategy is vital to modern data-driven businesses. This book is your essential guide to planning, developing and implementing such a strategy, presenting a framework which takes you from data strategy definition tVezava: Mehka53,45 € Data Strategy(2021) WALLIS, IANA well thought out, fit-for-purpose data strategy is vital to modern data-driven businesses. This book is your essential guide to planning, developing and implementing such a strategy, presenting a framework which takes you from data strategy definition tVezava: Mehka53,45 €
 
     
     
     
      




 
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
           
 
          





 
              
             
              
             
              
             
              
            