Configuring SonicWALL Firewalls
Bendell, Dan;
20 764 Ft
Protecting Critical Infrastructures Against Cyber-Attack
Lukasik, Stephen;
13 153 Ft
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series + Final Chapter
Russell, Ryan; Long, Johnny; Mullen, Timothy;
30 945 Ft
Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code
Erbschloe, Michael;
Cyber Crime and Cyber Terrorism Investigator's Handbook
Akhgar, Babak; Staniforth, Andrew; Bosco, Francesca; (ed.)
18 643 Ft
How to Define and Build an Effective Cyber Threat Intelligence Capability
Dalziel, Henry; , Olson, Eric; Carnall, James; (ed.)
13 553 Ft
Introduction to US Cybersecurity Careers
Dalziel, Henry;
14 825 Ft
How to Defeat Advanced Malware: New Tools for Protection and Forensics
Dalziel, Henry; , Crosby, Simon; (ed.)
Data Breach Preparation and Response: Breaches are Certain, Impact is Not
Fowler, Kevvie;
22 885 Ft
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy
Sammons, John; Cross, Michael;
11 856 Ft
Research Methods for Cyber Security
Edgar, Thomas W.; Manz, David O.;
33 490 Ft
Securing the Internet of Things
Li, Shancang; Xu, Li Da;
19 491 Ft
Figyelem! Ez a tétel már a kosarában van példányban. Növelni akarja a példányszámot?