Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This fully updated edition of the longest-selling, most successful computer security book worldwide features an all-new "5 Deployments" approach
First to market! This is the only book focusing solely on Cisco network hacking, security auditing and defense issues.
Helps thwart various kinds of Windows attacks. This book helps you learn by looking through the eyes of the hacker how devastating attacks are executed and how to protect your Windows systems and networks from them. It covers various versions of Windows - including Windows Vista and Windows XP - as well as and Windows Server 2000, 2003, and 2007.
Based on the Linux 2.6 kernel, this title reveals Linux attacks, countermeasures, and case studies. It helps to learn how to secure any version of Linux that you are running.
Revealing security vulnerabilities in Web-based services, this book provides details on the hacks and attacks alongside countermeasures, risk ratings, and real-world case studies.
A completely updated bestseller with six brand-new chapters covering the latest computer forensics cases.
In-depth explanations of over a dozen ways that unified communications systems can be hacked and exactly how to protect them from attack, based wholly on actual real-world scenarios.
Fully updated to cover the most current tools, techniques, and exploits, this new edition presents the latest Hacking Exposed strategies for defending against the world's number one attack type: malware
Featuring the proven Hacking Exposed method, this new edition of this bestseller reveals how to defend against the latest wireless network attacks by getting inside the mind of the hacker.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.