Toggle navigation
Fra Danmark siden 2005
BETA
DKK
AUD
(Australian Dollars)
A$
BRL
(Brazilian real)
R$
CAD
(Canadian Dollars)
CA$
CHF
(Swiss francs)
Fr.
CNY
(Chinese yuan)
元
CZK
(Czech koruny)
Kč
DKK
(Danske kroner)
EUR
(Euro)
€
GBP
(Pounds Sterling)
£
HKD
(Hong Kong dollars)
HK$
HUF
(Hungarian forints)
Ft
ILS
(Israeli shekel)
₪
ISK
(Icelandic kronur)
Íkr
JPY
(Japanese yen)
¥
KRW
(South Korean won)
₩
MXN
(Mexican peso)
Mex$
NOK
(Norwegian kroner)
NOK
NZD
(New Zealand dollars)
PLN
(Polish złotys)
zł
SEK
(Svenske kroner)
SEK
SGD
(Singapore dollars)
S$
TRY
(Turkish lira)
₺
USD
(Dollars)
$
ZAR
(South African rand)
R
Dansk
Deutsch
Deutsch (Switzerland)
English
English (Australia)
English (United Kingdom)
Español
Français
Nederlands
Norsk
Polski
Português
Português do Brasil
Suomi
Svenska
Vlaamse (Belgium)
Søg
Søg
Søg
Avanceret søgning
Kundeservice
Kundeservice
Kundeservice
Spørgsmål & Svar
Vinyl FAQ
Kontakt
Gavekort
Log ind
Søg
Udgivelser fra Syngress Media,U.S.
Forside
Kampagner
Vinyl
CD'er
K-pop
Film
Bøger
Merchandise
Forside
Forside
Kampagner
Vinyl
CD'er
K-pop
Film
Bøger
Merchandise
Søg
Forlag
Syngress Media,U.S.
Paperback Bog
The Basics of Cyber Warfare: Und...
(2012)
Andress, Jason (CISSP, ISSAP, CI...
DKK 217
Køb
Paperback Bog
The Basics of Cloud Computing: U...
(2013)
Rountree, Derrick ((CISSP, CASP,...
DKK 397
Køb
Paperback Bog
Federated Identity Primer
(2012)
Rountree, Derrick ((CISSP, CASP,...
DKK 304
Køb
Paperback Bog
Cybercrime Case Presentation: An...
(2012)
Shavers, Brett (Digital Forensic...
DKK 258
Køb
Paperback Bog
Cybercrime Investigation Case St...
(2012)
Shavers, Brett (Digital Forensic...
DKK 258
Køb
Paperback Bog
Cybercrime Investigative Case Ma...
(2012)
Shavers, Brett (Digital Forensic...
DKK 258
Køb
Paperback Bog
Linux Malware Incident Response:...
(2013)
Casey, Eoghan (Eoghan Casey, cmd...
DKK 258
Køb
Paperback Bog
Assessing Vendors: A Hands-On Gu...
(2013)
More, Josh (Senior Security Cons...
DKK 351
Køb
Paperback Bog
Practical Anonymity: Hiding in P...
(2013)
Loshin, Pete (Internet-Standard....
DKK 351
Køb
Paperback Bog
1. udgave
The Wireshark Field Guide: Analy...
(2013)
Shimonski, Robert (Director, IT ...
DKK 397
Køb
Paperback Bog
2. udgave
Business Continuity and Disaster...
(2013)
Snedaker, Susan (MCSE, MCT Found...
DKK 723
Køb
Paperback Bog
Simple Steps to Data Encryption:...
(2013)
Loshin, Peter (Internet-Standard...
DKK 351
Køb
Paperback Bog
X-Ways Forensics Practitioner's ...
(2013)
Shavers, Brett (Digital Forensic...
DKK 630
Køb
Paperback Bog
2. udgave
The Basics of Hacking and Penetr...
(2013)
Engebretson, Patrick (Dakota Sta...
DKK 217
Køb
Paperback Bog
The Basics of Web Hacking: Tools...
(2013)
Josh Pauli
DKK 351
Køb
Paperback Bog
Job Reconnaissance: Using Hackin...
(2013)
More, Josh (Senior Security Cons...
DKK 351
Køb
Paperback Bog
The Basics of Cyber Safety: Comp...
(2016)
Sammons, John (Associate Profess...
DKK 397
Køb
Paperback Bog
2. udgave
Cyber Warfare: Techniques, Tacti...
(2013)
Andress, Jason (CISSP, ISSAP, CI...
DKK 444
Køb
Paperback Bog
Cyber Security and IT Infrastruc...
(2013)
Vacca, John R. (Information Tech...
DKK 537
Køb
Paperback Bog
2. udgave
Managing Information Security
(2013)
John Vacca
DKK 537
Køb
Paperback Bog
2. udgave
Network and System Security
(2013)
John R Vacca
DKK 630
Køb
Paperback Bog
1. udgave
Securing VoIP: Keeping Your VoIP...
(2014)
(Bud) Bates, Regis J. Jr (TC Int...
DKK 537
Køb
Paperback Bog
Collaboration with Cloud Computi...
(2014)
Messier, Ric (GSEC, CEH, CISSP, ...
DKK 537
Køb
Paperback Bog
4. udgave
Windows Forensic Analysis Toolki...
(2014)
Carvey, Harlan (DFIR analyst, pr...
DKK 723
Køb
Paperback Bog
Applied Network Security Monitor...
(2014)
Sanders, Chris (Senior Informati...
DKK 412
Køb
Paperback Bog
Python Forensics: A Workbench fo...
(2014)
Hosmer, Chet (President, Python ...
DKK 723
Køb
Paperback Bog
Cloud Storage Forensics
(2013)
Quick, Darren (Darren Quick is a...
DKK 723
Køb
Paperback Bog
Social Engineering Penetration T...
(2014)
Watson, Gavin (Professional Serv...
DKK 537
Køb
Paperback Bog
Threat Forecasting: Leveraging B...
(2016)
Pirc, John (Director, Security S...
DKK 409
Køb
Paperback Bog
The Basics of Digital Privacy: S...
(2013)
Cherry, Denny ((MCSA, MCDBA, MCT...
DKK 351
Køb
Paperback Bog
1. udgave
Detecting and Combating Maliciou...
(2014)
Ryan, Julie JCH (Associate Profe...
DKK 351
Køb
Paperback Bog
2. udgave
The Basics of Information Securi...
(2014)
Andress, Jason (CISSP, ISSAP, CI...
DKK 397
Køb
Paperback Bog
1. udgave
Breaking into Information Securi...
(2015)
More, Josh (Senior Security Cons...
DKK 444
Køb
Paperback Bog
1. udgave
Designing and Building Security ...
(2014)
Nathans, David (SC Magazine, con...
DKK 537
Køb
Paperback Bog
3. udgave
Securing SQL Server: Protecting ...
(2015)
Cherry, Denny ((MCSA, MCDBA, MCT...
DKK 537
Køb
Paperback Bog
4. udgave
PCI Compliance: Understand and I...
(2014)
Williams, Branden R. (CISSP, CIS...
DKK 723
Køb
Paperback Bog
The Cloud Security Ecosystem: Te...
(2015)
Choo, Raymond (Fulbright Scholar...
DKK 1.189
Køb
Paperback Bog
Hacking Web Intelligence: Open S...
(2015)
Chauhan, Sudhanshu (Security Ana...
DKK 630
Køb
Paperback Bog
Building a Practical Information...
(2016)
Andress, Jason (CISSP, ISSAP, CI...
DKK 723
Køb
Paperback Bog
Smart Grid Security: Innovative ...
(2015)
Florian Skopik
DKK 1.189
Køb
Paperback Bog
1. udgave
Building an Intelligence-Led Sec...
(2014)
Liska, Allan (Allan Liska, secur...
DKK 723
Køb
Paperback Bog
4. udgave
Penetration Tester's Open Source...
(2016)
Faircloth, Jeremy ((Security+, C...
DKK 630
Køb
Paperback Bog
Optimizing IEEE 802.11i Resource...
(2014)
Iraj Sadegh Amiri
DKK 723
Køb
Paperback Bog
Security Controls Evaluation, Te...
(2016)
Johnson, Leighton (CTO and Senio...
DKK 769
Køb
Paperback Bog
Mobile Data Loss: Threats and Co...
(2015)
Raggo, Michael T. (CISSP, NSA-IA...
DKK 351
Køb
Paperback Bog
Automating Open Source Intellige...
(2015)
Layton, Robert (Research Fellow ...
DKK 318
Køb
Paperback Bog
A Machine-Learning Approach to P...
(2014)
Akanbi, O.A. (Graduate student i...
DKK 723
Køb
Paperback Bog
3. udgave
Google Hacking for Penetration T...
(2015)
Gardner, Bill (Bill Gardner OSCP...
DKK 478
Køb
Paperback Bog
2. udgave
Windows Registry Forensics: Adva...
(2016)
Carvey, Harlan (DFIR analyst, pr...
DKK 553
Køb
Paperback Bog
DNS Security: Defending the Doma...
(2016)
Liska, Allan (Consulting Systems...
DKK 537
Køb
Paperback Bog
Hiding Behind the Keyboard: Unco...
(2016)
Shavers, Brett (Digital Forensic...
DKK 630
Køb
Paperback Bog
Data Breach Preparation and Resp...
(2016)
Fowler, Kevvie (Partner and Nati...
DKK 723
Køb
Paperback Bog
Network Performance and Security...
(2016)
Chapman, Chris (Senior Methodolo...
DKK 630
Køb
Hardcover bog
Handbook of System Safety and Se...
(2016)
Edward Griffor
DKK 1.933
Køb
Paperback Bog
Next Generation Red Teaming
(2015)
Dalziel, Henry (Founder, Concise...
DKK 444
Køb
Paperback Bog
Infosec Management Fundamentals
(2015)
Dalziel, Henry (Founder, Concise...
DKK 444
Køb
Paperback Bog
Securing Social Media in the Ent...
(2015)
Dalziel, Henry (Founder, Concise...
DKK 444
Køb
Paperback Bog
Dissecting the Hack: The V3rb0t3...
(2015)
Street, Jayson E. (Principle Par...
DKK 444
Køb
Paperback Bog
Protecting Patient Information: ...
(2016)
Cerrato, Paul (Contributing Edit...
DKK 537
Køb
Paperback Bog
Data Hiding Techniques in Window...
(2016)
Hassan, Nihad Ahmad (IT Security...
DKK 537
Køb
Paperback Bog
Implementing Digital Forensic Re...
(2016)
Sachowski, Jason (CISSP-ISSAP, C...
DKK 630
Køb
Paperback Bog
OS X Incident Response: Scriptin...
(2021)
Bradley, Jaron (Senior Intrusion...
DKK 630
Køb
Paperback Bog
Practical Deployment of Cisco Id...
(2015)
Richter, Andy (Principle Network...
DKK 723
Køb
Paperback Bog
Securing the Internet of Things
(2017)
Shancang Li
DKK 630
Køb
Paperback Bog
Digital Forensics: Threatscape a...
(2015)
John Sammons
DKK 537
Køb
Paperback Bog
PCI DSS 3.1: The Standard That K...
(2015)
Williams, Branden R. (CISSP, CIS...
DKK 351
Køb
Paperback Bog
Mobile Security and Privacy: Adv...
(2016)
Man-Ho Au
DKK 1.002
Køb
Paperback Bog
Deploying Secure Containers for ...
(2015)
Dalziel, Henry (Founder, Concise...
DKK 300
Køb
Paperback Bog
Automated Security Analysis of A...
(2015)
Dalziel, Henry (Founder, Concise...
DKK 444
Køb
Paperback Bog
Cyber Security Awareness for Law...
(2015)
David Willson
DKK 444
Køb
Paperback Bog
Meeting People via WiFi and Blue...
(2015)
Dalziel, Henry (Founder, Concise...
DKK 444
Køb
Paperback Bog
Cyber Security Awareness for Acc...
(2015)
David Willson
DKK 444
Køb
Paperback Bog
Cyber Security Awareness for CEO...
(2015)
David Willson
DKK 444
Køb
Paperback Bog
Essential Skills for Hackers
(2015)
Kevin Cardwell
DKK 444
Køb
Paperback Bog
Cyber Security Awareness for Cor...
(2015)
David Willson
DKK 444
Køb
Paperback Bog
Cyber Guerilla
(2016)
Van Haaster, Jelle (Netherlands ...
DKK 537
Køb
Paperback Bog
Contemporary Digital Forensic In...
(2016)
Kim Kwang Raymond Choo
DKK 1.002
Køb
Paperback Bog
Hacking Wireless Access Points: ...
(2016)
Kurtz, Jennifer (Information Ass...
DKK 537
Køb
Paperback Bog
Research Methods for Cyber Security
(2017)
Edgar, Thomas W. (Senior Cyber S...
DKK 909
Køb
Paperback Bog
A Study of Black Hole Attack Sol...
(2015)
Iraj Sadegh Amiri
DKK 723
Køb
Paperback Bog
Theoretical and Experimental Met...
(2015)
Iraj Sadegh Amiri
DKK 723
Køb
Paperback Bog
2. udgave
Coding for Penetration Testers: ...
(2016)
Andress, Jason (CISSP, ISSAP, CI...
DKK 537
Køb
Paperback Bog
Executing Windows Command Line I...
(2016)
Hosmer, Chet (President, Python ...
DKK 723
Køb
Paperback Bog
Advanced Persistent Security: A ...
(2016)
Winkler, Ira ((CISSP), President...
DKK 537
Køb
Paperback Bog
Preserving Electronic Evidence f...
(2016)
Rojas, Ernesto F. (CISSP, DFCP, ...
DKK 723
Køb
Paperback Bog
Information Security Science: Me...
(2016)
Young, Carl (Managing Director a...
DKK 723
Køb
Paperback Bog
2. udgave
Federal Cloud Computing: The Def...
(2017)
Metheny, Matthew (Chief Informat...
DKK 723
Køb
Paperback Bog
Integrating Python with Leading ...
(2016)
Hosmer, Chet (President, Python ...
DKK 630
Køb
Paperback Bog
3. udgave
Eleventh Hour CISSP®: Study Guide
(2016)
Feldman, Joshua (Senior Vice Pre...
DKK 262
Køb
Paperback Bog
Cisco PIX Firewalls: Configure /...
(2005)
Umer Khan
DKK 583
Køb
Paperback Bog
Sockets, Shellcode, Porting, and...
(2005)
Foster, James C (Deputy Director...
DKK 583
Køb
Paperback Bog
Securing IM and P2P Applications...
(2005)
Marcus Sachs
DKK 583
Køb
Paperback Bog
1. udgave
Host Integrity Monitoring Using ...
(2005)
Brian Wotring
DKK 537
Køb
Paperback Bog
How to Cheat at Managing Windows...
(2006)
Barber, B. (Senior Technology Co...
DKK 490
Køb
Paperback Bog
Skype Me! From Single User to Sm...
(2005)
Markus Daehne
DKK 434
Køb
Paperback Bog
How to Cheat at IT Project Manag...
(2005)
Snedaker, Susan (MCSE, MCT Found...
DKK 537
Køb
Paperback Bog
1. udgave
Perfect Password: Selection, Pro...
(2005)
Burnett, Mark (Independent resea...
DKK 332
Køb
Paperback Bog
Security Log Management: Identif...
(2006)
Babbin, Jacob (Contractor with a...
DKK 583
Køb
Paperback Bog
1. udgave
RFID Security
(2006)
Thornton, Frank (Owner, Blacktho...
DKK 583
Køb
Paperback Bog
Insider Threat: Protecting the E...
(2006)
Eric Cole
DKK 434
Køb
1–100
101–200