Wir konnten keine exakten Treffer zu Ihrer Suche nach "Computer Security" finden. Könnten diese Produkte zu Ihrer Suche passen?

Ansicht:
David Seidl: Comptia Security+ Practice Tests, Buch

David Seidl
Comptia Security+ Practice Tests

Efficient preparation for the CompTIA SY0-701 exam Your career in IT security begins with successful completion of the SY0-701 exam. Prepare for the test with CompTIA(R) Security+(R) Practice Tests: Exam …

lieferbar innerhalb 2-3 Wochen
Buch
EUR 44,37*
Artikel ist im Warenkorb
Michael Rosing: Elliptic Curve Cryptography for Developers, Buch

Michael Rosing
Elliptic Curve Cryptography for Developers

Elliptic Curve Cryptography (ECC) is the powerful security protocol used for everything from credit card transitions to the blockchain. This reader-friendly book guides you step-by-step until you're ready…

lieferbar ab 29.10.2024.
Buch
EUR 68,70*
Artikel ist im Warenkorb
Cassie Crossley: Software Supply Chain Security, Buch

Cassie Crossley
Software Supply Chain Security

"Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of d…

sofort lieferbar
Buch
EUR 51,98*
Artikel ist im Warenkorb
Douglas Rushkoff: Program or Be Programmed, Buch

Douglas Rushkoff,
Program or Be Programmed

A deep dive into one of this century's most potent questions: do we direct technology, or do we let ourselves be directed by it? This compact new edition of a paradigmatic text packs a big and actionable …

lieferbar ab 1.10.2024.
Buch
EUR 19,93*
Artikel ist im Warenkorb
Len Noe: Human Hacked, Buch

Len Noe
Human Hacked

Discover the future of cybersecurity through the eyes of the world's first augmented ethical hacker In Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker by Len Noe, a pioneer…

lieferbar ab 29.10.2024.
Buch
EUR 34,39*
Artikel ist im Warenkorb
Drinor Selmanaj: Adversary Emulation with Mitre Att&ck, Buch

Drinor Selmanaj
Adversary Emulation with Mitre Att&ck

By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). This co…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 64,31*
Artikel ist im Warenkorb
Brandon Carroll: Securing the AWS Cloud, Buch

Brandon Carroll
Securing the AWS Cloud

Make your next Amazon Web Services deployment secure and private Dive into the world of cloud security with Securing the AWS Cloud: A Guide for Learning to Secure AWS Infrastructure by Brandon Carroll, a…

lieferbar ab 27.11.2024.
Buch
EUR 68,20*
Artikel ist im Warenkorb
Aaron Mauro: The Language of Cyber Attacks, Buch

Aaron Mauro,
The Language of Cyber Attacks

Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain sensitive information or compromise a computer system. The perils of clicking an unkno…

lieferbar ab 3.10.2024.
Buch
EUR 101,04*
Artikel ist im Warenkorb
Steve Suehring: Learning DevSecOps, Buch

Steve Suehring
Learning DevSecOps

How do some organizations maintain 24-7 internet-scale operations? How can organizations integrate security while continuously deploying new features? How do organizations increase security within their D…

sofort lieferbar
Buch
EUR 51,98*
Artikel ist im Warenkorb
Aaron Mauro: The Language of Cyber Attacks, Buch

Aaron Mauro,
The Language of Cyber Attacks

Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain sensitive information or compromise a computer system. The perils of clicking an unkno…

lieferbar ab 3.10.2024.
Buch
EUR 33,48*
Artikel ist im Warenkorb
: Autonomous Cyber Resilience, Buch

Autonomous Cyber Resilience

Authoritative and highly comprehensive resource on the latest research and strategies to develop cyber resilience in any network system Autonomous Cyber Resilience presents key research contributions in t…

Erscheint bald
Buch
Chuck Brooks: Inside Cyber, Buch

Chuck Brooks
Inside Cyber

A FASCINATING EXPLORATION OF THE IMPACT OF THE LATEST TECH ON MODERN COMMERCE In Inside Cyber: How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security, author Chuck Brooks, a distin…

lieferbar ab 15.10.2024.
Buch
EUR 28,41*
Artikel ist im Warenkorb
Cameron H Malin: Synthetic Media, Deep Fakes, and Cyber Deception, Buch

Cameron H Malin, Matthew Canham, Kirk Kennedy
Synthetic Media, Deep Fakes, and Cyber Deception

Synthetic Media, Deepfakes, and Cyber Deception: Attacks, Analysis, and Defenses introduces the only analytical Synthetic Media Analysis Framework (SMAF) to help describe cyber threats and help security p…

lieferbar ab 1.10.2025.
Buch
EUR 147,13*
Artikel ist im Warenkorb
Bruce Schneier: A Hacker's Mind, Buch

Bruce Schneier
A Hacker's Mind

A hack is any means of subverting a system's rules in unintended ways. The tax code isn't computer code, but a series of complex formulas. It has vulnerabilities; we call them "loopholes." We call exploit…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 19,93*
Artikel ist im Warenkorb
: Deterrence in the 21st Century, Buch

Deterrence in the 21st Century

The information age has opened a new front of adversarial statecraft. The past decades have seen the rise and refinement of conflict enacted in the world of information, with tactics including seeding dis…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 75,78*
Artikel ist im Warenkorb
Mark Buckwell: Security Architecture for Hybrid Cloud, Buch

Mark Buckwell, Stefaan van Daele, Carsten Horst
Security Architecture for Hybrid Cloud

As the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workloads. Adopting zero trust principles demands a systematic set of practices to delive…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 58,32*
Artikel ist im Warenkorb
Jimmy Ray: Policy as Code, Buch

Jimmy Ray
Policy as Code

In today's cloud native world, where we automate as much as possible, everything is code. With this practical guide, you'll learn how Policy as Code (PaC) provides the means to manage the policies, relate…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 79,27*
Artikel ist im Warenkorb
David Kennedy: Metasploit, Buch

David Kennedy, Jim O'Gorman, Devon Kearns, Mati Ahoroni
Metasploit

How to identify and exploit security vulnerabilities with Metasploit, the world's most popular penetration testing framework. - Metasploit is used by security professionals everywhere - No competing title…

Erscheint bald
Buch
Michael Kofler: Hacking and Security, Buch

Michael Kofler, Tobias Scheible, Matthias Wübbeling, Klaus Gebeshuber
Hacking and Security

Rheinwerk Computing

Uncover security vulnerabilities and harden your system against attacks! With this guide you'll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydr…

sofort lieferbar
Buch
EUR 63,76*
Artikel ist im Warenkorb
Michael Kehoe: Building an Effective Incident Management Program, Buch

Michael Kehoe, David Cintz
Building an Effective Incident Management Program

System downtime is a common pain point for a great many organizations. Recently, a 12-hour store outage cost one Silicon Valley giant $25 million. And a 14-hour outage cost another corporation an estimate…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 58,32*
Artikel ist im Warenkorb
Informationen zur Lieferbarkeit bzw. zu Veröffentlichungsterminen von Artikeln beruhen auf Vorabinformationen unserer Lieferanten. Diese Termine sind ohne Gewähr und können sich jederzeit ändern.