Zbirka: Omrežna varnost

70 rezultatov

  • Ogled izdelka
    The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers(2005) KEVIN MITNICK
    Vezava: Mehka
    19,45 €
  • Ogled izdelka
    The Art of Deception: Controlling the Human Element of Security(2003) KEVIN MITNICK
    Vezava: Mehka
    13,90 €
  • Ogled izdelka
    Network Security and Cryptography(2018) MUSA, SARHAN M.
    The definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Inte
    89,59 €
  • Ogled izdelka
    Web Application Security(2024) HOFFMAN, ANDREW
    In this revised and updated second edition, author Andrew Hoffman examines dozens of related topics, from the latest types of attacks and mitigations to threat modeling, the secure software development lifecycle (SSDL/SDLC), and more.
    67,97 €
  • Ogled izdelka
    Network Security, Firewalls And Vpns(2020) STEWART, J. MICHAEL,KINSEY, DENISE
    100,06 €
  • Ogled izdelka
    Identity-Native Infrastructure Access Management(2023) KONTSEVOY, EV,SHAH, SAKSHYAM,CONRAD, PETER
    In this practical book, authors Ev Kontsevoy, Sakshyam Shah, and Peter Conrad break this topic down into manageable pieces. You'll discover how different parts of the approach fit together in a way that enables engineering teams to build more secure appli
    51,40 €
  • Ogled izdelka
    Arista Warrior(2017) DONAHUE, GARY A.
    In this updated edition, renowned trainer, consultant, and technical author Gary A. Donahue (Network Warrior) provides an in-depth, objective guide to Arista’s products. You’ll learn why the company’s network switches, software products, and Extensible Op
    82,08 €
  • Ogled izdelka
    Cyber Threats and Nuclear Weapons(2021) LIN, HERBERT
    35,36 €
  • Ogled izdelka
    Violent Python(2012) O'CONNOR, TJ
    Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frame
    50,52 €
  • Ogled izdelka
    Unauthorised Access(2009) WIL ALLSOPP
    Vezava: Mehka
    41,69 €
  • Ogled izdelka
    Lab Manual for Nelson/Phillips/Steuart's Guide to Computer Forensics and Investigations, 5th(2015) BLITZ, ANDREW
    58,55 €
  • Ogled izdelka
    Incident Response & Computer Forensics, Third Edition(2014) JASON LUTTGENS
    Vezava: Mehka
    64,13 €
  • Ogled izdelka
    Information Security Risk Assessment Toolkit(2012) TALABIS, MARK (CHIEF THREAT SCIENTIST OF ZVELO INC),MARTIN, JASON (IS THE VICE PRESIDENT OF CLOUD BUSINESS FOR FIREEYE, INC.)
    Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a
    55,11 €
  • Ogled izdelka
    The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2E(2011) DAFYDD STUTTARD
    Vezava: Mehka
    59,00 €
  • Ogled izdelka
    Digital Forensics with Open Source Tools(2011) CARVEY, HARLAN (DFIR ANALYST, PRESENTER, AND OPEN-SOURCE TOOL AUTHOR),ALTHEIDE, CORY
    Focuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of f
    69,74 €
  • Ogled izdelka
    24 Deadly Sins of Software Security(2010) HOWARD
    78,24 €
  • Ogled izdelka
    Keys to the Kingdom(2012) OLLAM, DEVIANT (MEMBER OF THE BOARD OF DIRECTORS OF THE U.S. DIVISION OF TOOOL, THE OPEN ORGANISATION OF LOCKPICKERS AND SECURITY AUDITOR AND PENETRATION TESTING CONSULTANT WITH THE CORE GROUP)
    Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.
    64,30 €
  • Ogled izdelka
    BTEC Level 3 National IT Student Book 1(2010) ANDERSON, KAREN,JARVIS, ALAN,KAYE, ALLEN,PHILLIPS, JENNY,SMITH, ANDREW,MCGILL, RICHARD
    BTEC and Heinemann have joined forces to provide BTEC's own resources to accompany the new BTEC Level 3 National IT specification, supporting learners every step of the way to BTEC success.
    62,70 €
  • Ogled izdelka
    Basics of Cyber Warfare(2012) ANDRESS, JASON (CISSP, ISSAP, CISM, GPEN),WINTERFELD, STEVE ((CISSP, PMP, SANS GSEC, SIX SIGMA) HAS A STRONG TECHNICAL AND LEADERSHIP BACKGROUND IN CYBERSECURITY AND MILITARY INTELLIGENCE.)
    Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics a
    30,31 €
  • Ogled izdelka
    Core Data Analysis: Summarization, Correlation, and Visualization(2019) MIRKIN, BORIS
    83,95 €

Ostali so si ogledali tudi ...