101 products
Sort by
Sort by
Introduction to CyberWarfare: A Multidisciplinary Approach,Used Introduction to CyberWarfare: A Multidisciplinary Approach,Used
Add to wishlist
Quick view
Add to compare
Introduction to CyberWarfare: A Multidisciplinary Approach,Used
Introduction to CyberWarfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyberwarfare through the...
Sale price$18.27 Regular price$26.10
Quantity
Add to cart
Introduction to Information Security: A StrategicBased Approach,Used Introduction to Information Security: A StrategicBased Approach,Used
Add to wishlist
Quick view
Add to compare
Introduction to Information Security: A StrategicBased Approach,Used
Most introductory texts provide a technologybased survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and...
Sale price$36.05 Regular price$51.50
Quantity
Add to cart
Introduction to US Cybersecurity Careers,Used Introduction to US Cybersecurity Careers,Used
Add to wishlist
Quick view
Add to compare
Introduction to US Cybersecurity Careers,Used
Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown...
Sale price$36.36 Regular price$51.94
Quantity
Add to cart
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management,Used Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management,Used
Add to wishlist
Quick view
Add to compare
Logging and Log Management: The Authoritative Guide to Understanding the...
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of...
Sale price$22.20 Regular price$31.71
Quantity
Add to cart
Malware Forensics: Investigating and Analyzing Malicious Code,Used Malware Forensics: Investigating and Analyzing Malicious Code,Used
Add to wishlist
Quick view
Add to compare
Malware Forensics: Investigating and Analyzing Malicious Code,Used
Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and...
Sale price$11.01 Regular price$15.73
Quantity
Add to cart
Managing Information Security,Used Managing Information Security,Used
Add to wishlist
Quick view
Add to compare
Managing Information Security,Used
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion...
Sale price$34.88 Regular price$49.83
Quantity
Add to cart
New
MCSE: Planning, Implementing and Maintaining a Windows Server 2003 Environment for an MCSE Certified on Windows 2000 (Exam 7029,Used MCSE: Planning, Implementing and Maintaining a Windows Server 2003 Environment for an MCSE Certified on Windows 2000 (Exam 7029,Used
Add to wishlist
Quick view
Add to compare
MCSE: Planning, Implementing and Maintaining a Windows Server 2003 Environment...
MCSE Exam 70296 Study Guide & DVD Training System: Planning, Implementing and Maintaining a Windows Server 2003 Environment for an MCSE Certified on Windows 2000...
Sale price$17.25 Regular price$24.64
Quantity
Add to cart
Mobile Malware Attacks and Defense,Used Mobile Malware Attacks and Defense,Used
Add to wishlist
Quick view
Add to compare
Mobile Malware Attacks and Defense,Used
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book...
Sale price$60.84 Regular price$86.91
Quantity
Add to cart
Nessus, Snort, And Ethereal Power Tools: Customizing Open Source Security Applications Nessus, Snort, And Ethereal Power Tools: Customizing Open Source Security Applications
Add to wishlist
Quick view
Add to compare
Nessus, Snort, And Ethereal Power Tools: Customizing Open Source Security...
Nessus, Snort, And Ethereal Power Tools Covers Customizing Snort To Perform Intrusion Detection And Prevention; Nessus To Analyze The Network Layer For Vulnerabilities; And Ethereal...
Sale price$15.60 Regular price$22.29
Quantity
Add to cart
Network and System Security,Used Network and System Security,Used
Add to wishlist
Quick view
Add to compare
Network and System Security,Used
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems...
Sale price$12.26 Regular price$17.51
Quantity
Add to cart
OS X Incident Response: Scripting and Analysis,Used OS X Incident Response: Scripting and Analysis,Used
Add to wishlist
Quick view
Add to compare
OS X Incident Response: Scripting and Analysis,Used
OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesserknown operating system. By mastering...
Sale price$35.40 Regular price$50.57
Quantity
Add to cart
Penetration Tester's Open Source Toolkit,Used Penetration Tester's Open Source Toolkit,Used
Add to wishlist
Quick view
Add to compare
Penetration Tester's Open Source Toolkit,Used
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box...
Sale price$18.21 Regular price$26.01
Quantity
Add to cart
Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring,Used Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring,Used
Add to wishlist
Quick view
Add to compare
Perl Scripting for Windows Security: Live Response, Forensic Analysis, and...
I decided to write this book for a couple of reasons. One was that Ive now written a couple of books that have to do...
Sale price$24.68 Regular price$35.26
Quantity
Add to cart
New
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects,Used Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects,Used
Add to wishlist
Quick view
Add to compare
Placing the Suspect Behind the Keyboard: Using Digital Forensics and...
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as...
Sale price$41.86 Regular price$59.80
Quantity
Add to cart
New
Practical Lock Picking: A Physical Penetration Tester'S Training Guide Practical Lock Picking: A Physical Penetration Tester'S Training Guide
Add to wishlist
Quick view
Add to compare
Practical Lock Picking: A Physical Penetration Tester'S Training Guide
Practical Lock Picking: A Physical Penetration Testers Training Guide Introduces The Reader To The Basic Principles Of Lock Picking. The Book Combines Both Easytofollow, Stepbystep...
Sale price$66.80 Regular price$95.43
Quantity
Add to cart
Professional Penetration Testing: Creating and Learning in a Hacking Lab,Used Professional Penetration Testing: Creating and Learning in a Hacking Lab,Used
Add to wishlist
Quick view
Add to compare
Professional Penetration Testing: Creating and Learning in a Hacking Lab,Used
Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testingthe act of testing a computer...
Sale price$15.89 Regular price$22.70
Quantity
Add to cart
Python Passive Network Mapping: P2NMAP,Used Python Passive Network Mapping: P2NMAP,Used
Add to wishlist
Quick view
Add to compare
Python Passive Network Mapping: P2NMAP,Used
Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity.The "Heartbleed" vulnerability has...
Sale price$88.89 Regular price$126.99
Quantity
Add to cart
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century,Used Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century,Used
Add to wishlist
Quick view
Add to compare
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic...
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft...
Sale price$14.31 Regular price$20.44
Quantity
Add to cart
Securing SQL Server, Third Edition,Used Securing SQL Server, Third Edition,Used
Add to wishlist
Quick view
Add to compare
Securing SQL Server, Third Edition,Used
SQL server is the most widelyused database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer...
Sale price$26.63 Regular price$38.04
Quantity
Add to cart
Securing SQL Server: Protecting Your Database from Attackers,Used Securing SQL Server: Protecting Your Database from Attackers,Used
Add to wishlist
Quick view
Add to compare
Securing SQL Server: Protecting Your Database from Attackers,Used
SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive...
Sale price$14.14 Regular price$20.20
Quantity
Add to cart

Recently viewed products