
ilość książek w kategorii: 5084
![]() |
Comment protéger votre entreprise des cybermenaces ?: Un guide complet pour aider les entreprises à renforcer en 18 étapes la sécurité de leurs donnée
ISBN: 9781709096761 / Francuski / Miękka / 2019 / 78 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
120,98 |
![]() |
Hacken mit Hardware-Gadgets
ISBN: 9783743195882 / Niemiecki / Miękka / 2023 / 196 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
120,98 |
![]() |
Shields Up: Complete Guide to Windows Security and Mac Privacy
ISBN: 9781470120917 / Angielski / Miękka / 2012 / 160 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Is your computer really safe? Are you sure your privacy is protected online? "Shields Up Complete Guide to Windows Security and Mac Privacy" will arm you with fundamental knowledge to stay safe both online and offline. With "Shields Up " you will:
Is your computer really safe? Are you sure your privacy is protected online? "Shields Up Complete Guide to Windows Security and Mac Privacy" will... |
cena:
121,18 |
![]() |
Planning, Deploying and Installing Data Protector 9: For the datacentre, the cloud and remote offices
ISBN: 9781508556107 / Angielski / Miękka / 2015 / 376 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This very accessible book is a valuable resource for pre-sales, consultants, sysadmins and anyone involved in deploying a new instance of Data Protector. For resellers, distributors or HP staff involved in pre-sales it provides an overview of research into what the customer base has found valuable in Data Protector, and some in-depth coverage of some very common solution designs. For consultants and implementors this book provides step-by-step screenshots to implement Data Protector functions from scratch. The walk-throughs show much more detail than the HP-supplied manuals, and also provides...
This very accessible book is a valuable resource for pre-sales, consultants, sysadmins and anyone involved in deploying a new instance of Data Protect...
|
cena:
121,18 |
![]() |
Python Scapy Dot11: Programacion en Python para pentesters Wi-Fi
ISBN: 9781542748704 / Hiszpański / Miękka / 2017 / 226 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
121,18 |
![]() |
Python Scapy Dot11: Python Programming for Wi-Fi pentesters
ISBN: 9781722351496 / Angielski / Miękka / 2018 / 250 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
121,18 |
![]() |
The Hacker Playbook 3: Practical Guide to Penetration Testing
ISBN: 9781980901754 / Angielski / Miękka / 2018 / 290 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
121,18 |
![]() |
Cybersecurity Maturity Model Certification (CMMC): Levels 1-3 Manual: Detailed Security Control Implementation Guidance
ISBN: 9781650526157 / Angielski / Miękka / 2019 / 234 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
121,18 |
![]() |
Privacy Policy Template (2023 Edition)
ISBN: 9798853486201 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
121,18 |
![]() |
Who Clicked the Link?: Cybersecurity from the server room to the boardroom
ISBN: 9788740982954 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
121,18 |
![]() |
The vCISO Playbook: How Virtual CISOs Deliver Enterprise-Grade Cybersecurity to Small and Medium Businesses (SMBs)
ISBN: 9781966415046 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
121,18 |
![]() |
The Quantum Guard: Redefining Security and Privacy in the Age of AI and Quantum Computing
ISBN: 9798300165734 / Angielski / Miękka / 2024 / 240 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
121,26 |
![]() |
GnuTLS Reference Manual
ISBN: 9789888381647 / Angielski / Miękka / 2015 / 326 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures. It is aimed to be portable and efficient with focus on security and interoperability.
GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language a...
|
cena:
121,35 |
![]() |
Shishi - Kerberos 5 Implementation
ISBN: 9789888381777 / Angielski / Miękka / 2015 / 280 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Shishi is an implementation of the Kerberos 5 network authentication system, as specified in RFC 4120. Shishi can be used to authenticate users in distributed systems. Shishi contains a library ('libshishi') that can be used by application developers to add support for Kerberos 5. Shishi contains a command line utility ('shishi') that is used by users to acquire and manage tickets (and more). The server side, a Key Distribution Center, is implemented by 'shishid'. Of course, a manual documenting usage aspects as well as the programming API is included. Shishi currently supports AS/TGS...
Shishi is an implementation of the Kerberos 5 network authentication system, as specified in RFC 4120. Shishi can be used to authenticate users in dis...
|
cena:
121,35 |
![]() |
The Hacker Ethos: The Beginner's Guide to Ethical Hacking and Penetration Testing
ISBN: 9781523764365 / Angielski / Miękka / 2016 / 386 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The Hacker Ethos is a condensed, easy-to-read guidebook on the subject of Ethical Hacking and Penetration Testing, the legal procedure for testing computer security by simulating real cyber attacks. Written by an expert in Computer Science and Information Security with ten years of experience in his field at the time of writing, The Hacker Ethos was specifically designed to be put in the hands of the beginner-level hacker, IT professional, and hopeful IT security researcher. This book covers the fundamental concepts of computer science and introduces the core knowledge that is required by all...
The Hacker Ethos is a condensed, easy-to-read guidebook on the subject of Ethical Hacking and Penetration Testing, the legal procedure for testing com...
|
cena:
121,35 |
| |
The Story of Netscreen: The Chinese in Silicon Valley
ISBN: 9781539774594 / Chiński / Miękka / 2016 / 148 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. NetScreen Tech Inc. was founded in Silicon Valley in 1997 by 3 young Chinese engineers. Their goal was to design and implement high performance network security products. NetScreen was acquired by Juniper Networks with 4.1 billion dollars in April, 2004. This book is about the story of NetScreen.
NetScreen Tech Inc. was founded in Silicon Valley in 1997 by 3 young Chinese engineers. Their goal was to design and implement high performance networ...
|
cena:
121,35 |
![]() |
PacketFence 7 Administration Guide
ISBN: 9789888407187 / Angielski / Miękka / 2017 / 154 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
121,35 |
![]() |
Hacking & Tor: The Complete Beginners Guide To Hacking, Tor, & Accessing The Deep Web & Dark Web
ISBN: 9781979944182 / Angielski / Miękka / 2017 / 360 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
121,35 |
![]() |
PASS the CompTIA Network+ Exam N10-008
ISBN: 9798494009128 / Angielski / Miękka / 2021 / 496 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
121,35 |
![]() |
Password Authentication for Web and Mobile Apps: The Developer's Guide To Building Secure User Authentication
ISBN: 9798649303095 / Angielski / Miękka / 2020 / 144 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
121,35 |