![]() |
Cracking: Kali Linux, Parrot OS, BackBox & BlackArch
ISBN: 9781839389405 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
108,05 |
![]() |
Cybersecurity Explained
ISBN: 9789153145295 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
228,02 |
![]() |
Burp Suite Hacking: From Recon to Exploitation
ISBN: 9781839389429 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
133,59 |
![]() |
Metasploit Pentesting: Hands-On Offensive Security Suite
ISBN: 9781839389443 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
133,59 |
![]() |
Malware Narratives: An Introduction, Revised Edition
ISBN: 9781912636525 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
106,43 |
![]() |
Cybersecurity Essentials for Small Businesses: Protect Your Business from Breaches, Ransomware, and Compliance Failures
ISBN: 9781069643773 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
72,03 |
![]() |
Cyber Threat Hunters Handbook: Applying advanced analytics, automation, and collaborative intelligence for digital defense (English Edition)
ISBN: 9789365898965 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
170,07 |
![]() |
Scams, Hacking, and Cybersecurity: The Ultimate Guide to Online Safety and Privacy
ISBN: 9781965480052 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
83,58 |
![]() |
Year One Cybersecurity
ISBN: 9781088286715 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
113,99 |
![]() |
Learning Ransomware Response & Recovery: Stopping Ransomware One Restore at a Time
ISBN: 9781098169589 / Angielski / 03-03-2026 Książka dostępna od: 03-03-2026 |
|
Termin ukazania się książki: 03-03-2026
Książkę można już zamówić z rabatem 5% |
|
221,02 |
![]() |
Security for Everyone: Low-cost approaches to digital security for yourself and your growing business
ISBN: 9781952120329 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
133,04 |
![]() |
Security for Everyone: Low-cost approaches to digital security for yourself and your growing business
ISBN: 9781952120886 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
159,64 |
![]() |
Ultimate Microsoft Security Copilot for Security Operations
ISBN: 9789349888111 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
191,36 |
![]() |
Security Power Tools
ISBN: 9780596009632 / Angielski / Miękka / 860 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms. What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Sec... |
cena:
228,02 |
![]() |
Malicious Mobile Code: Virus Protection for Windows
ISBN: 9781565926820 / Angielski / Miękka / 542 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60... Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairl... |
cena:
171,00 |
![]() |
Socioeconomic and Legal Implications of Electronic Intrusion
ISBN: 9781605662046 / Angielski / Twarda / 388 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the information society, electronic intrusion has become a new form of trespassing often causing significant problems and posing great risks for individuals and businesses. Socioeconomic and Legal Implications of Electronic Intrusion focuses on abusive and illegal practices of penetration in the sphere of private communications. A leading international reference source within the field, this book provides legal and political practitioners, academicians, and intrusion researchers with expert knowledge into global theft and spam perspectives, identity theft and fraud, and electronic crime...
In the information society, electronic intrusion has become a new form of trespassing often causing significant problems and posing great risks for in...
|
cena:
984,88 |
![]() |
Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives
ISBN: 9781609601232 / Angielski / Twarda / 316 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing, surveillance and analysis, but organizational advances are needed to foster collaboration between federal, state and local agencies as well as the private sector.
Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational an...
|
cena:
909,96 |
![]() |
Violence in Today's School Workplace: Protecting Teachers and School Employees in a Violent Age
ISBN: 9780972713467 / Angielski / Twarda / 184 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Increasingly, headlines today report out-of-control student violence occurring in our schools and colleges. Yet so little concrete action is being taken to protect the bystanding victims of this trauma the school worker. Classroom teachers, administrators, coaches, school bus drivers, cafeteria workers, custodians, and other school employees are all at risk. Now, at last, a hands-on guidebook to help educators win back the job they were hired to do, namely: educate our young people and prepare them to succeed throughout life s journey. In Violence in Today's School... Increasingly, headlines today report out-of-control student violence occurring in our schools and colleges. Yet so little concrete action is being ... |
cena:
285,98 |
![]() |
Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies
ISBN: 9781609608514 / Angielski / Twarda / 338 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber security, encompassing both information and network security, is of utmost importance in today's information age. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies details the latest and most important advances in security standards. First, it introduces the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter...
Cyber security, encompassing both information and network security, is of utmost importance in today's information age. Cyber Security Standards, Prac...
|
cena:
984,88 |
![]() |
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations
ISBN: 9781609608309 / Angielski / Twarda / 280 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is a unique and important contribution to the literature on cyber crime. It explores gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing. These and other tactics designed to inflict intimidation, control, and other harms are frequently committed by perpetrators who, for many reasons, are unlikely to be identified or punished. Scholars, researchers, law makers, and ordinary women and their supporters will gain a better...
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is a unique and important contribution to the literature on cyber crime. It e...
|
cena:
984,88 |