Refinar

Filtro selecionado
Idiomas
Nível
Método
Preço
Remover Filtros
Idiomas
Preço
Editora

SCHNEIER´S CRYPTOGRAPHY CLASSICS LIBRARY john wiley

* Cryptography is the study of message secrecy and is used in fields such as computer science, computer and network security, and even in instances of everyday life, such as ATM cards, computer passwo...

R$ 706,00
em até 4x sem juros no cartão

Produto Disponível

CISCO ASA AND PIX, AND FWSM FIREWALL HANDBOOK - 2ND ED pearson higher education

This guide explains the features available for configuring and managing the PIX and ASA security appliance families and the catalyst firewall services module (FWSM). A network engineer at the Universi...

R$ 150,00
em até 3x sem juros no cartão

Produto Disponível

INCIDENT RESPONSE & COMPUTER FORENSICS - 3RD ED mcgraw hill professional

The definitive guide to incident response--updated for the first time in a decade! Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensic...

R$ 423,60
em até 4x sem juros no cartão

Produto sob Encomenda

SECURITY ENGINEERING - 2ND ED john wiley

The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a livel...

R$ 600,10
em até 4x sem juros no cartão

Produto sob Encomenda

GUIDE TO CONFIDENTIALITY, AUTHENTICATION, AND INTEGRITY crc press

The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the fiel...

R$ 719,25
em até 4x sem juros no cartão

Produto sob Encomenda