Configuring SonicWALL Firewalls
Bendell, Dan;
20 764 Ft
16 611 Ft
Conquest in Cyberspace: National Security and Information Warfare
Libicki, Martin C.;
27 329 Ft
21 864 Ft
16 195 Ft
12 956 Ft
Protecting Critical Infrastructures Against Cyber-Attack
Lukasik, Stephen;
13 153 Ft
10 523 Ft
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series + Final Chapter
Russell, Ryan; Long, Johnny; Mullen, Timothy;
30 945 Ft
24 756 Ft
Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code
Erbschloe, Michael;
Cyber Crime and Cyber Terrorism Investigator's Handbook
Akhgar, Babak; Staniforth, Andrew; Bosco, Francesca; (ed.)
18 643 Ft
14 914 Ft
How to Define and Build an Effective Cyber Threat Intelligence Capability
Dalziel, Henry; , Olson, Eric; Carnall, James; (ed.)
13 553 Ft
10 842 Ft
Introduction to US Cybersecurity Careers
Dalziel, Henry;
14 825 Ft
11 860 Ft
How to Defeat Advanced Malware: New Tools for Protection and Forensics
Dalziel, Henry; , Crosby, Simon; (ed.)
Data Breach Preparation and Response: Breaches are Certain, Impact is Not
Fowler, Kevvie;
22 885 Ft
18 308 Ft
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy
Sammons, John; Cross, Michael;
11 856 Ft
9 484 Ft
Research Methods for Cyber Security
Edgar, Thomas W.; Manz, David O.;
33 490 Ft
26 792 Ft
Securing the Internet of Things
Li, Shancang; Xu, Li Da;
19 491 Ft
15 593 Ft
Technological Turf Wars ? A Case Study of the Computer Antivirus Industry: A Case Study of the Computer Antivirus Industry
Johnston, Jessica R.;
11 635 Ft
9 308 Ft
Figyelem! Ez a tétel már a kosarában van példányban. Növelni akarja a példányszámot?