Configuring SonicWALL Firewalls
Bendell, Dan;
20 764 HUF
Protecting Critical Infrastructures Against Cyber-Attack
Lukasik, Stephen;
13 153 HUF
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series + Final Chapter
Russell, Ryan; Long, Johnny; Mullen, Timothy;
30 945 HUF
Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code
Erbschloe, Michael;
Cyber Crime and Cyber Terrorism Investigator's Handbook
Akhgar, Babak; Staniforth, Andrew; Bosco, Francesca; (ed.)
18 643 HUF
How to Define and Build an Effective Cyber Threat Intelligence Capability
Dalziel, Henry; , Olson, Eric; Carnall, James; (ed.)
13 553 HUF
Introduction to US Cybersecurity Careers
Dalziel, Henry;
14 825 HUF
How to Defeat Advanced Malware: New Tools for Protection and Forensics
Dalziel, Henry; , Crosby, Simon; (ed.)
Data Breach Preparation and Response: Breaches are Certain, Impact is Not
Fowler, Kevvie;
22 885 HUF
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy
Sammons, John; Cross, Michael;
11 856 HUF
Research Methods for Cyber Security
Edgar, Thomas W.; Manz, David O.;
33 490 HUF
Securing the Internet of Things
Li, Shancang; Xu, Li Da;
19 491 HUF
Attention! 0 copies of this item are already in your shopping basket. Would you like to increase the number of copies?