All categories
caret-down
cartcart

Popularity
Inside Cyber Warfare
Inside Cyber Warfare
from  Jeffrey CarrUsed - goodBook - Used - good
Book€5.49
€5.49

GDPR: Guiding Your Business To Compliance: A practical guide to meeting GDPR regulations. (Edition 2, Band 2)
Book€5.49
€5.49

The Craft of System Security
The Craft of System Security
from  Sean SmithUsed - very goodBook - Used - very good
Book€2.99
€2.99

Official (ISC)2 Guide to the CISSP CBK (Isc2 Press)
Official (ISC)2 Guide to the CISSP CBK (Isc2 Press)
from  Tipton, Harold F.Used - very goodBook - Used - very good
Book€2.61
€2.61

Security on Rails (The Pragmatic Programmers)
Book€1.99
€1.99

PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
Book€3.99
€3.99

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
New €28.88
You save €8.89 (30%)
Book€19.99
You save €8.89 (30%)
New €28.88€19.99

Windows Server 2003 Security Cookbook (Cookbooks (O'Reilly))
Book€18.49
€18.49

Podcasting Hacks: Tips and Tools for Blogging Out Loud
Book€8.99
€8.99

Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
from  Chris McNabUsed - very goodBook - Used - very good
Book€25.49
€25.49

Check Point FireWall-1, w. CD-ROM: An Administration Guide (Networking)
Book€14.99
€14.99

Unix System Security Tools, w. CD-ROM (Unix Tools)
Book€2.32
€2.32

Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet
Book€1.99
€1.99


Hackers: Crime and the Digital Sublime
Hackers: Crime and the Digital Sublime
from  Paul TaylorUsed - goodBook - Used - good
Book€2.31
€2.31

Strategic Information Warfare: A New Face of War
Book€10.49
€10.49

Information Security Risk Analysis
Information Security Risk Analysis
from  Peltier, Thomas R.Used - very goodBook - Used - very good
Book€1.99
€1.99

A Pathology of Computer Viruses
A Pathology of Computer Viruses
from  David FerbracheUsed - goodBook - Used - good
New €53.49
You save €17.50 (32%)
Book€35.99
You save €17.50 (32%)
New €53.49€35.99

Cryptographic Hardware and Embedded Systems: First International Workshop, CHES'99 Worcester, MA, USA, August 12-13, 1999 Proceedings (Lecture Notes in Computer Science)
New €53.49
You save €42.00 (78%)
Book€11.49
You save €42.00 (78%)
New €53.49€11.49

Ubiquitous Intelligence and Computing: 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedings (Lecture Notes in Computer ... Applications, incl. Internet/Web, and HCI)
New €106.99
You save €102.50 (95%)
Book€4.49
You save €102.50 (95%)
New €106.99€4.49

Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems (SpringerBriefs in Electrical and Computer Engineering)
New €53.49
You save €31.50 (58%)
Book€21.99
You save €31.50 (58%)
New €53.49€21.99


A Practical Guide to Managing Information Security (Artech House Technology Management Library)
Book€2.32
€2.32

Cisco Secure Virtual Private Networks (CSVPN) (Cisco Career Certification)
Book€2.58
€2.58

Cisco Secure PIX Firewall Advanced (CSPFA) (Cisco Career Certification)
Book€1.73
€1.73

Hacking Web Apps: Detecting and Preventing Web Application Security Problems
New €38.50
You save €11.01 (28%)
Book€27.49
You save €11.01 (28%)
New €38.50€27.49

Beginning Ethical Hacking with Python
Beginning Ethical Hacking with Python
from  Sanjib SinhaUsed - very goodBook - Used - very good
New €37.44
You save €13.45 (35%)
Book€23.99
You save €13.45 (35%)
New €37.44€23.99

Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
New €64.19
You save €8.78 (13%)
Book€55.41
You save €8.78 (13%)
New €64.19€55.41

How to Complete a Risk Assessment in 5 Days or Less
How to Complete a Risk Assessment in 5 Days or Less
from  Peltier, Thomas R.Used - very goodBook - Used - very good
Book€7.99
€7.99

Using Social Media for Global Security
Using Social Media for Global Security
from  Ravi GuptaUsed - goodBook - Used - good
Book€11.99
€11.99