search for books and compare prices
computer hackers matches 32 work(s)
< previous 25 |
displaying 26 to 32 |
at end
Paperback:
9781597495882 | Syngress Media Inc, September 23, 2010, cover price $49.95
Hardcover:
9781616928056 | Idea Group Reference, July 31, 2010, cover price $180.00
Paperback:
9781597492157 | Syngress Media Inc, February 22, 2008, cover price $49.95
Miscellaneous:
9780080558752 | Syngress Media Inc, February 1, 2008, cover price $49.95
Paperback:
9780071832380 | 4th edition (McGraw-Hill Osborne Media, January 5, 2015), cover price $60.00
9780071742559, titled "Gray Hat Hacking the Ethical Hackers Handbook" | 3 edition (McGraw-Hill Osborne Media, January 6, 2011), cover price $60.00
9780071495684 | 2 edition (Osborne McGraw-Hill, December 20, 2007), cover price $49.99
9780072257090 | Osborne McGraw-Hill, November 16, 2004, cover price $49.99
Product Description: Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes worksheets at every stage for creating a comprehensive security plan meaningful to management and technical staff Uses practical risk management techniques to intelligently assess and manage the network security risks facing your organization Presents the material in a witty and lively style, backed up by solid business planning methods Companion Web site provides all worksheets and the security planning template...read more (view table of contents, read Amazon.com's description)
Paperback:
9780471211655 | John Wiley & Sons Inc, January 1, 2003, cover price $55.00 | About this edition: Offers customized security improvement plan templates, accompanying worksheets, and risk management techniques,
Miscellaneous:
9780471456773 | John Wiley & Sons Inc, February 13, 2003, cover price $40.00 | About this edition: Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes worksheets at every stage for creating a comprehensive security plan meaningful to management and technical staff Uses practical risk management techniques to intelligently assess and manage the network security risks facing your organization Presents the material in a witty and lively style, backed up by solid business planning methods Companion Web site provides all worksheets and the security planning template
Describes how to install and configure a security analysis and monitoring system using both Windows and UNIX.
(view table of contents)
Paperback:
9780471229469 | Pap/cdr edition (John Wiley & Sons Inc, February 1, 2003), cover price $50.00 | About this edition: Describes how to install and configure a security analysis and monitoring system using both Windows and UNIX.
Miscellaneous:
9780471463054 | John Wiley & Sons Inc, February 5, 2003, cover price $50.00
Product Description: Using the exploits of three international hackers, Cyberpunk provides a fascinating tour of a bizarre subculture populated by outlaws who penetrate even the most sensitive computer networks and wreak havoc on the information they find -- everything from bank accounts to military secrets...read more
Hardcover:
9780671683221 | Simon & Schuster, June 1, 1991, cover price $22.95 | About this edition: Profiles computer hackers who overstep ethical boundaries and break the law to penetrate society's most sensitive computer networks
Paperback:
9780684818627 | Updated edition (Simon & Schuster, November 1, 1995), cover price $25.95 | About this edition: Using the exploits of three international hackers, Cyberpunk provides a fascinating tour of a bizarre subculture populated by outlaws who penetrate even the most sensitive computer networks and wreak havoc on the information they find -- everything from bank accounts to military secrets.
9780671778798 | Reprint edition (Touchstone Books, July 1, 1992), cover price $12.00 | About this edition: Profiles computer hackers who overstep ethical boundaries and break the law to penetrate society's most sensitive computer networks
< previous 25 |
displaying 26 to 32 |
at end