Kompiuterio sauga (anglų k.)

iš viso 20
Rodoma 1-2020


-15% su kodu: ENG15
Li, F: Privacy Computing
Li, F: Privacy Computing Fenghua Li, Ben Ni...
266,81 €
313,89 €
  • Išsiųsime per 10–14 d.d.

-15% su kodu: ENG15
CISM Certified Information Security Manager Study Guide
CISM Certified Information Secur... Mike Chapple
84,99 €
99,99 €
  • Išsiųsime per 10–14 d.d.

-15% su kodu: ENG15
Crypto Dictionary
Crypto Dictionary Jean-Philippe Auma...
27,45 €
32,29 €
  • Išsiųsime per 10–14 d.d.

-15% su kodu: ENG15
Cyberjutsu
Cyberjutsu Ben Mccarty
32,55 €
38,29 €
  • Išsiųsime per 10–14 d.d.

-15% su kodu: ENG15
Hacking
Hacking Jon Erickson
53,12 €
62,49 €
  • Išsiųsime per 10–14 d.d.

-15% su kodu: ENG15
Hackers. 25th Anniversary Edition
Hackers. 25th Anniversary Edition Steven Levi
38,84 €
45,69 €
  • Išsiųsime per 10–14 d.d.

-15% su kodu: ENG15
Social Engineering
Social Engineering Christopher Hadnagy
50,06 €
58,89 €
  • Išsiųsime per 10–14 d.d.

-15% su kodu: ENG15
The Art of Cyberwarfare
The Art of Cyberwarfare Jon Dimaggio
42,83 €
50,39 €
  • Išsiųsime per 10–14 d.d.

-15% su kodu: ENG15
The Manga Guide to Cryptography 
The Manga Guide to Cryptography  Masaaki Mitani, Sh...
30,25 €
35,59 €
  • Išsiųsime per 10–14 d.d.

-15% su kodu: ENG15
Applications and Techniques in Information Security
Applications and Techniques in Information Secu...
95,19 €
111,99 €
  • Išsiųsime per 10–14 d.d.

The Age of AI
The Age of AI Henry A Kissinger,...
  • Išparduota

Hacking with Kali Linux
Hacking with Kali Linux Julian James McKinnon
  • Išparduota

Computer Network Security
Computer Network Security
  • Išparduota

Progress in Cryptology - LATINCRYPT 2010
Progress in Cryptology - LATINCRYPT 2010
  • Išparduota

Hacking for Dummies
Hacking for Dummies Kevin Beaver
  • Išparduota

Cryptography and Network Security: Principles and Practice, Global Edition
Cryptography and Network Securit... William Stallings
  • Išparduota

Obfuscation
Obfuscation Finn Brunton, Hele...
  • Išparduota

The Art of Invisibility
The Art of Invisibility Kevin Mitnick
  • Išparduota

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
(ISC)2 CISSP Certified Informati... Mike Chapple, Jame...
  • Išparduota

Black Hat Python
Black Hat Python Justin Seitz
  • Išparduota

[{"option":"93","probability":1,"style":{"backgroundColor":"#da1e2d"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/68c116ea05a901757484778.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"92","probability":20,"style":{"backgroundColor":"#f2f2f2"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/68c02c908e7b91757424784.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"91","probability":14,"style":{"backgroundColor":"#da1e2d"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/68c02c796a6721757424761.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"90","probability":16,"style":{"backgroundColor":"#f2f2f2"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/68c02c643d12e1757424740.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"89","probability":15,"style":{"backgroundColor":"#dd1e2e"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/68c02c4cbd2651757424716.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"88","probability":15,"style":{"backgroundColor":"#f2f2f2"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/68c02bd3ad9ff1757424595.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"87","probability":17,"style":{"backgroundColor":"#de1e2e"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/68c02b8a530ca1757424522.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"86","probability":2,"style":{"backgroundColor":"#f3f3f3"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/68c02b71066401757424497.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}}]