cartcart

    Popularity
    Microsoft Azure Security Infrastructure (It Best Practices - Microsoft Press)
    book€11.49
    €11.49

    CISSP All-in-One Exam Guide
    CISSP All-in-One Exam Guide
    from  Shon HarrisUsed - very goodbook - Used - very good
    New €80.12
    You save €51.13 (63%)
    book€28.99
    You save €51.13 (63%)
    New €80.12€28.99

    Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
    book€186.99
    €186.99

    Official (Isc)2 Guide to the CISSP Cbk, Fourth Edition (Isc2 Press)
    book€22.99
    €22.99

    Malicious Cryptography: Exposing Cryptovirology
    New €50.70
    You save €30.21 (59%)
    book€20.49
    You save €30.21 (59%)
    New €50.70€20.49

    The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) (SEI Series in Software Engineering)
    New €67.00
    You save €22.51 (33%)
    book€44.49
    You save €22.51 (33%)
    New €67.00€44.49

    Recommended for you

















    Linux Firewalls: Attack Detection and Response with IPTABLES, PSAD, and FWSNORT
    book€31.49
    €31.49

    Mastering FreeBSD and OpenBSD Security
    Mastering FreeBSD and OpenBSD Security
    from  Yanek KorffUsed - acceptablebook - Used - acceptable
    book€19.99
    €19.99

    Security in Computing
    Security in Computing
    from  Pfleeger, Charles P.Used - very goodbook - Used - very good
    New €144.44
    You save €89.45 (61%)
    book€54.99
    You save €89.45 (61%)
    New €144.44€54.99

    Software Security Engineering: A Guide for Project Managers (SEI Series in Software Engineering)
    book€21.49
    €21.49

    Understanding Public-Key Infrastructure: Concepts, Standards, Deployment Considerations (MacMillan Technology)
    book€20.49
    €20.49

    Handbook of Data Compression
    Handbook of Data Compression
    from  David SalomonUsed - very goodbook - Used - very good
    New €160.49
    You save €76.00 (47%)
    book€84.49
    You save €76.00 (47%)
    New €160.49€84.49

    Authentication: From Passwords to Public Keys
    Authentication: From Passwords to Public Keys
    from  Smith, Richard E.Used - acceptablebook - Used - acceptable
    book€7.49
    €7.49

    SSL and TLS: Building and Designing Secure Systems
    New €47.03
    You save €23.04 (48%)
    book€23.99
    You save €23.04 (48%)
    New €47.03€23.99

    Web Application Security (Beginner's Guide (McGraw Hill))
    New €44.00
    You save €37.01 (84%)
    book€6.99
    You save €37.01 (84%)
    New €44.00€6.99

    Buffer Overflow Attacks: Detect, Exploit, Prevent
    book€16.99
    €16.99

    Traffic Engineering with MPLS
    Traffic Engineering with MPLS
    from  Eric OsborneUsed - goodbook - Used - good
    book€22.99
    €22.99

    The Architecture of Privacy: On Engineering Technologies That Can Deliver Trustworthy Safeguards
    book€19.99
    €19.99

    Building Digital Experience Platforms: A Guide to Developing Next-Generation Enterprise Applications
    New €58.84
    You save €28.35 (48%)
    book€30.49
    You save €28.35 (48%)
    New €58.84€30.49

    802.11 Security (Classique Us)
    802.11 Security (Classique Us)
    from  Bruce PotterUsed - goodbook - Used - good
    book€4.99
    €4.99

    Safety Critical Computer Systems
    Safety Critical Computer Systems
    from  Neil StoreyUsed - goodbook - Used - good
    book€15.49
    €15.49

    Implementing Elliptic Curve Cryptography
    Implementing Elliptic Curve Cryptography
    from  Michael RosingUsed - goodbook - Used - good
    book€8.99
    €8.99

    Dark Territory: The Secret History of Cyber War
    Dark Territory: The Secret History of Cyber War
    from  Fred KaplanUsed - very goodbook - Used - very good
    New €26.49
    You save €2.00 (7%)
    book€24.49
    You save €2.00 (7%)
    New €26.49€24.49

    Honeypots: Tracking Hackers
    Honeypots: Tracking Hackers
    from  Lance SpitznerUsed - acceptablebook - Used - acceptable
    book€15.99
    €15.99

    Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
    New €40.00
    You save €27.51 (68%)
    book€12.49
    You save €27.51 (68%)
    New €40.00€12.49

    Codebreaker
    Codebreaker
    from  Stephen PincockUsed - goodbook - Used - good
    book€10.99
    €10.99

    Threat Modeling (Microsoft Professional)
    Threat Modeling (Microsoft Professional)
    from  Frank SwiderskiUsed - very goodbook - Used - very good
    book€9.49
    €9.49

    Blockchain: Ultimate guide to understanding blockchain, bitcoin, cryptocurrencies, smart contracts and the future of money.
    book€4.99
    €4.99

    Cyber-Physical Attacks: A Growing Invisible Threat
    New €43.50
    You save €8.88 (20%)
    book€34.62
    You save €8.88 (20%)
    New €43.50€34.62

    SonarQube in Action
    SonarQube in Action
    from  Campbell, G. AnnUsed - very goodbook - Used - very good
    New €48.14
    You save €8.15 (16%)
    book€39.99
    You save €8.15 (16%)
    New €48.14€39.99

    Recommended for you