270 rezultatov
-
-
-
-
Hyperautomation with Generative AI(2023) SINGH GILL, NAVDEEP,KAUR, JAGREET64,30 €
SINGH GILL, NAVDEEP,KAUR, JAGREET
Hyperautomation with Generative AI
Zaloga po trgovinah
Rezultati:
-
Coding for Penetration Testers(2011) ANDRESS, JASON (CISSP, ISSAP, CISM, GPEN),LINN, RYAN (OSCE, GPEN, CCNP SECURITY, CISSP)Tools used for penetration testing are often purchased off-the-shelf. Each tool is based on a programming language like Perl, JavaScript, Python, etcetera. This title provides the reader an understanding of the scripting languages that are in common use w35,36 €
ANDRESS, JASON (CISSP, ISSAP, CISM, GPEN),LINN, RYAN (OSCE, GPEN, CCNP SECURITY, CISSP)
Coding for Penetration Testers
Tools used for penetration testing are often purchased off-the-shelf. Each tool is based on a programming language like Perl, JavaScript, Python, etcetera. This title provides the reader an understanding of the scripting languages that are in common use w
Zaloga po trgovinah
Rezultati:
-
Secure Multiparty Computation and Secret Sharing(2015) CRAMER, RONALD (STICHTING CENTRUM VOOR WISKUNDE EN INFORMATICA (CWI), AMSTERDAM),DAMGARD, IVAN BJERRE (AARHUS UNIVERSITET, DENMARK),NIELSEN, JESPER BUUS (AARHUS UNIVERSITET, DENMARK)This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation and secret sharing. The authors present feasibility results from the last 30 years, generalizations to arbitrary access structures,111,93 €
CRAMER, RONALD (STICHTING CENTRUM VOOR WISKUNDE EN INFORMATICA (CWI), AMSTERDAM),DAMGARD, IVAN BJERRE (AARHUS UNIVERSITET, DENMARK),NIELSEN, JESPER BUUS (AARHUS UNIVERSITET, DENMARK)
Secure Multiparty Computation and Secret Sharing
This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation and secret sharing. The authors present feasibility results from the last 30 years, generalizations to arbitrary access structures,
Zaloga po trgovinah
Rezultati:
-
Official (ISC)2® Guide to the CAP® CBK®(2012) HOWARD, PATRICK D. (CHIEF INFORMATION SECURITY OFFICER, NUCLEAR REGULATORY COMMISSION, USA)Demonstrates the effectiveness of certification and accreditation as a risk management methodology for IT systems in public and private organizations. This work provides security professionals with an overview of C&A components, showing them how to docume118,72 €
HOWARD, PATRICK D. (CHIEF INFORMATION SECURITY OFFICER, NUCLEAR REGULATORY COMMISSION, USA)
Official (ISC)2® Guide to the CAP® CBK®
Demonstrates the effectiveness of certification and accreditation as a risk management methodology for IT systems in public and private organizations. This work provides security professionals with an overview of C&A components, showing them how to docume
Zaloga po trgovinah
Rezultati:
-
Software Supply Chain Security(2024) CROSSLEY, CASSIEThis practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain.57,71 €
CROSSLEY, CASSIE
Software Supply Chain Security
This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain.
Zaloga po trgovinah
Rezultati:
-
-
Building a Cyber Risk Management Program(2023) ALLEN, BRIAN,BAPST, BRANDON,HICKS, TERRYIdeal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.61,56 €
ALLEN, BRIAN,BAPST, BRANDON,HICKS, TERRY
Building a Cyber Risk Management Program
Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.
Zaloga po trgovinah
Rezultati:
-
Hacking Exposed 7(2012) MCCLURE, STUART,SCAMBRAY, JOEL,KURTZ, GEORGEThis fully updated edition of the longest-selling, most successful computer security book worldwide features an all-new “5 Deployments” approach70,54 €
MCCLURE, STUART,SCAMBRAY, JOEL,KURTZ, GEORGE
Hacking Exposed 7
This fully updated edition of the longest-selling, most successful computer security book worldwide features an all-new “5 Deployments” approach
Zaloga po trgovinah
Rezultati:
-
Enterprise Security Architecture(2005) SHERWOOD, NICHOLASSecurity is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterprise165,38 €
SHERWOOD, NICHOLAS
Enterprise Security Architecture
Security is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterprise
Zaloga po trgovinah
Rezultati:
-
-
-
Violent Python(2012) O'CONNOR, TJDemonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frame50,52 €
O'CONNOR, TJ
Violent Python
Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frame
Zaloga po trgovinah
Rezultati:
-
Understanding Cryptography: A Textbook for Students and Practitioners()54,56 €
Understanding Cryptography: A Textbook for Students and Practitioners
Zaloga po trgovinah
Rezultati:
-
-
Computer Security and Penetration Testing(2013) BROWN, PHD, CISSP, CISA, MARY (CAPELLA UNIVERSITY),BASTA, NADINE,BASTA, ALFREDOffers readers of all backgrounds and experience levels a well-researched and engaging introduction to the realm of network security. This title addresses how and why people attack computers and networks - equipping readers with the knowledge and techniqu140,56 €
BROWN, PHD, CISSP, CISA, MARY (CAPELLA UNIVERSITY),BASTA, NADINE,BASTA, ALFRED
Computer Security and Penetration Testing
Offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the realm of network security. This title addresses how and why people attack computers and networks - equipping readers with the knowledge and techniqu
Zaloga po trgovinah
Rezultati:
-
-
Incident Response & Computer Forensics, Third Edition(2014) JASON LUTTGENSVezava: Mehka64,13 €
JASON LUTTGENS
Incident Response & Computer Forensics, Third Edition
Zaloga po trgovinah
Rezultati: