Products

Product categories

Filters

Filters

Clear all
107 products
Sort by
Sort by
Introduction to CyberWarfare: A Multidisciplinary Approach,Used Introduction to CyberWarfare: A Multidisciplinary Approach,Used
Add to wishlist
Quick view
Add to compare
Introduction to CyberWarfare: A Multidisciplinary Approach,Used
Introduction to CyberWarfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyberwarfare through the...
Sale price$11.89 Regular price$16.99
Quantity
Add to cart
Introduction to Information Security: A StrategicBased Approach,Used Introduction to Information Security: A StrategicBased Approach,Used
Add to wishlist
Quick view
Add to compare
Introduction to Information Security: A StrategicBased Approach,Used
Most introductory texts provide a technologybased survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and...
Sale price$9.77 Regular price$13.96
Quantity
Add to cart
Introduction to US Cybersecurity Careers,Used Introduction to US Cybersecurity Careers,Used
Add to wishlist
Quick view
Add to compare
Introduction to US Cybersecurity Careers,Used
Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown...
Sale price$36.86 Regular price$52.66
Quantity
Add to cart
Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game,Used Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game,Used
Add to wishlist
Quick view
Add to compare
Job Reconnaissance: Using Hacking Skills to Win the Job Hunt...
There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting...
Sale price$29.60 Regular price$42.29
Quantity
Add to cart
Sold out
Juniper(r) Networks Secure Access SSL VPN Configuration Guide,Used Juniper(r) Networks Secure Access SSL VPN Configuration Guide,Used
Add to wishlist
Quick view
Add to compare
Juniper(r) Networks Secure Access SSL VPN Configuration Guide,Used
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers....
Sale price$69.06 Regular price$103.59
Quantity
Add to cart
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from,Used Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from,Used
Add to wishlist
Quick view
Add to compare
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection...
Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linuxbased incidents....
Sale price$37.09 Regular price$52.99
Quantity
Add to cart
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management,Used Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management,Used
Add to wishlist
Quick view
Add to compare
Logging and Log Management: The Authoritative Guide to Understanding the...
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of...
Sale price$19.08 Regular price$27.26
Quantity
Add to cart
Malware Forensics: Investigating and Analyzing Malicious Code,Used Malware Forensics: Investigating and Analyzing Malicious Code,Used
Add to wishlist
Quick view
Add to compare
Malware Forensics: Investigating and Analyzing Malicious Code,Used
Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and...
Sale price$9.31 Regular price$13.30
Quantity
Add to cart
Managing Information Security,Used Managing Information Security,Used
Add to wishlist
Quick view
Add to compare
Managing Information Security,Used
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion...
Sale price$33.98 Regular price$48.54
Quantity
Add to cart
MCSE: Planning, Implementing and Maintaining a Windows Server 2003 Environment for an MCSE Certified on Windows 2000 (Exam 7029,Used MCSE: Planning, Implementing and Maintaining a Windows Server 2003 Environment for an MCSE Certified on Windows 2000 (Exam 7029,Used
Add to wishlist
Quick view
Add to compare
MCSE: Planning, Implementing and Maintaining a Windows Server 2003 Environment...
MCSE Exam 70296 Study Guide & DVD Training System: Planning, Implementing and Maintaining a Windows Server 2003 Environment for an MCSE Certified on Windows 2000...
Sale price$17.25 Regular price$24.64
Quantity
Add to cart
Mobile Malware Attacks and Defense,Used Mobile Malware Attacks and Defense,Used
Add to wishlist
Quick view
Add to compare
Mobile Malware Attacks and Defense,Used
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book...
Sale price$25.33 Regular price$36.19
Quantity
Add to cart
Network and System Security,Used Network and System Security,Used
Add to wishlist
Quick view
Add to compare
Network and System Security,Used
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems...
Sale price$11.88 Regular price$16.97
Quantity
Add to cart
OS X Incident Response: Scripting and Analysis,Used OS X Incident Response: Scripting and Analysis,Used
Add to wishlist
Quick view
Add to compare
OS X Incident Response: Scripting and Analysis,Used
OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesserknown operating system. By mastering...
Sale price$40.96 Regular price$58.51
Quantity
Add to cart
Penetration Tester's Open Source Toolkit,Used Penetration Tester's Open Source Toolkit,Used
Add to wishlist
Quick view
Add to compare
Penetration Tester's Open Source Toolkit,Used
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box...
Sale price$26.55 Regular price$37.93
Quantity
Add to cart
Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring,Used Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring,Used
Add to wishlist
Quick view
Add to compare
Perl Scripting for Windows Security: Live Response, Forensic Analysis, and...
I decided to write this book for a couple of reasons. One was that Ive now written a couple of books that have to do...
Sale price$23.37 Regular price$33.39
Quantity
Add to cart
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects,Used Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects,Used
Add to wishlist
Quick view
Add to compare
Placing the Suspect Behind the Keyboard: Using Digital Forensics and...
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as...
Sale price$41.96 Regular price$59.94
Quantity
Add to cart

Recently viewed products