Computer security

Linksys WRT54G Ultimate Hacking

Lead IT Security Engineer) Asadoorian GCIH) Paul ((GCIA y Manager for Information Services Security) Pesce GAWN Gold) GCFA Silver Larry ((CCNA

How to Cheat at Configuring Open Source Security Tools

Bleeding Edge Threats ( Jonkman Matt (Founder, CISSP) Manager of ArcSight's Strategic Application Solution Team) Marty Raffael ((GCIA, et al.

Hacking: The Next Generation

Brett Hardin, Nitesh Dhanjani, et al.

Network Security

Andre Perez

Trust And Security In Collaborative Computing

Usa) Zou Xukai (Indiana Univ--purdue Univ At Indianapolis (Iupui), Usa) Dai Yuanshun (Univ Of Tennessee, et al.

Mastering AWS Security

Albert Anthony

Malware Forensics Field Guide for Windows Systems: Digital...

Cameron H. Malin, USA) Casey MD Baltimore cmdLabs Eoghan (Eoghan Casey, et al.

Online Security for the Business Traveler

a legal consulting firm focusing on helping its clients navigate the legal issues LLC Deborah (Attorney and founder of Law2sm

Especialista en seguridad en internet. IFCM004PO


14,40 €

Beyond Cybersecurity: Protecting Your Digital Business

Derek O'Halloran, Alan Marcus, et al.

Configuring Internal Controls for Software as a Service:...

USA) Ee California San Francisco Chong (Trulia Inc.

RIoT Control: Understanding and Managing Risks and the...

USA) Macaulay CA Sunnyvale CISA Tyson (CISSP

Computer Security

Dieter Gollmann