L'impact invisible des actes de cybermalveillance. Comprendre et soutenir les victimes et les professionnel(le)s de la cybersécuritéAssociation de soutien aux vic (assovica)E-book2,99 €
Erstellen Sie Ihr eigenes VPN: Eine Schritt - für - Schritt - Anleitung. Erstellen Sie Ihr eigenes VPN Lin SongE-book3,99 €
ISACA CERTIFIED INFORMATION SECURITY MANAGER (CISM) QUESTIONS & DUMPS Exam Prep Questions for ISACA - Certify MartE-book7,49 €
CISM Certified Information Security Manager Exam Prep and Dumps ISACA CISM Exam Guidebook Updated Questions Byte BooksE-book6,49 €
CRISC Certified In Risk and Information Systems Control Exam Practice Questions And Dumps ISACA CRISC Exam Guidebook And Updated Questions Byte BooksE-book6,49 €
Cloud Security in der Praxis. Leitfaden für sicheres Softwaredesign und Deployment Chris Dotson, Thomas DemmigE-book39,90 €
Human Proxies in Cryptographic Networks. Establishing a new direction to end - to - end encryption with the introduction of the inner envelope in the echo protocolUni NurfE-book7,49 €
Les menaces persistantes avancées en cybersécurité – La guerre cybernétique Nicolae SfetcuE-book4,99 €
CISSP Domain 1 Study Guide ( Updated 2024 ) With Practice Exam Questions, Quizzes, Flash Cards. CISSP Study Guide - Updated 2024, #1 ADITYA .E-book26,99 €
Cybersecurity Dictionary for Everyone: 1250 Terms Explained in Simple English Tolga TavlasE-book9,99 €
IT - Security - immerhin besser als Fußpilz. Das Buch für jeden, der Daten besitzt - Ein IT - Selbsthilfe - GuidePeter DebusE-book14,99 €
Stealth Protocols - Using Phone to Create Feedback Loops in Closed Surveillance Systems. Stealth Protocols, #1 innerfoldE-book9,49 €
Fortaleciendo la Seguridad: Guía Práctica de Arquitectura de Confianza Cero. Zero Trust Arquitecture, #1 Gorka ArroyuelosE-book18,49 €