Computer security

Linksys WRT54G Ultimate Hacking

Lead IT Security Engineer) Asadoorian GCIH) Paul ((GCIA y Manager for Information Services Security) Pesce GAWN Gold) GCFA Silver Larry ((CCNA

How to Cheat at Configuring Open Source Security Tools

Bleeding Edge Threats (www.bleedingedgethreats.net)) Jonkman Matt (Founder, CISSP) Manager of ArcSight's Strategic Application Solution Team) Marty Raffael ((GCIA, et al.

Hacking: The Next Generation

Brett Hardin, Nitesh Dhanjani, et al.

Network Security

Andre Perez

Trust And Security In Collaborative Computing

Usa) Zou Xukai (Indiana Univ--purdue Univ At Indianapolis (Iupui), Usa) Dai Yuanshun (Univ Of Tennessee, et al.

Mastering AWS Security

Albert Anthony

Malware Forensics Field Guide for Windows Systems: Digital...

Cameron H. Malin, USA) Casey MD Baltimore cmdLabs Eoghan (Eoghan Casey, et al.

Online Security for the Business Traveler

a legal consulting firm focusing on helping its clients navigate the legal issues LLC Deborah (Attorney and founder of Law2sm

Especialista en seguridad en internet. IFCM004PO

JOSé LUIS VILLADA ROMERO

14,40 €

Beyond Cybersecurity: Protecting Your Digital Business

Derek O'Halloran, Alan Marcus, et al.

Configuring Internal Controls for Software as a Service:...

USA) Ee California San Francisco Chong (Trulia Inc.

RIoT Control: Understanding and Managing Risks and the...

USA) Macaulay CA Sunnyvale CISA Tyson (CISSP

Computer Security

Dieter Gollmann