Syngress Media
-
VIP 95折
The Basics of Web Hacking: Tools and Techniques to Attack the Web (Paperback)$1,280$1,216 -
Professional Penetration Testing, 2/e: Creating and Learning in a Hacking Lab (Paperback)$2,680$2,626 -
VIP 95折
Introduction to Cyber-Warfare: A Multidisciplinary Approach (Paperback)$1,930$1,834 -
The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic (Paperback)$1,200$1,176 -
50折
$1,240Windows Server 2012 Security from End to Edge and Beyond: Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions (Paperback) -
Simple Steps to Data Encryption: A Practical Guide to Secure Computing (Paperback)$1,050$1,029 -
60折
$990Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure (Paperback) -
VIP 95折
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems (Paperback)$960$912 -
50折
$1,050Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure (Paperback) -
50折
$1,025Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects (Paperback) -
VIP 95折
The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online$1,280$1,216 -
50折
$990Federal Cloud Computing: The Definitive Guide for Cloud Service Providers (Paperback) -
50折
$699Blackhatonomics: An Inside Look at the Economics of Cybercrime (Paperback) -
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management (Paperback)$1,750$1,715 -
UTM Security with Fortinet: Mastering FortiOS (Paperback)$1,900$1,862 -
Augmented Reality: An Emerging Technologies Guide to AR (Paperback)$1,800$1,764 -
85折
$1,403The Hacker's Guide to OS X: Exploiting OS X from the Root Up (Paperback) -
80折
$1,400Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization (Paperback) -
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols (Paperback)$1,650$1,617 -
VIP 95折
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (Paperback)$1,930$1,834 -
50折
$825Wireless Reconnaissance in Penetration Testing (Paperback) -
VIP 95折
Information Security Risk Assessment Toolkit: Practical Assessments Through Data Collection and Data Analysis$1,930$1,834 -
85折
$1,403Client-Side Attacks and Defense (Paperback) -
85折
$1,403Practical Lock Picking: A Physical Penetration Tester's Training Guide, 2/e (Paperback) -
50折
$825Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks (Paperback) -
50折
$990CISSP Study Guide, 2/e (Paperback) -
VIP 95折
Hacking Web Apps: Detecting and Preventing Web Application Security Problems (Paperback)$1,930$1,834 -
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance, 3/e (Paperback)$2,500$2,450 -
60折
$990Securing SQL Server, 2/e : Protecting Your Database from Attackers (Paperback) -
80折
$1,680SQL Injection Attacks and Defense, 2/e (Paperback)