Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20

Boeken van Michael Gregg

Michael Gregg
CEH Certified Ethical Hacker Version 9
0 beoordelingen
Learn, prepare, and practice for CEH v8 exam success with Certified Ethical Hacker (CEH) Cert Guide from Pearson IT Certification, a leader in IT certification. Meer
Michael Gregg
CISSP Exam Cram
0 beoordelingen
Thoroughly updated to prepare candidates for the new exam, this book includes:  Chapters that map directly to the exam objectivesComprehensive foundational learning on all topics covered on the exam An extensive collection of practice questions (including two full exams) A state-of-the-art practice test engine that provides real-time practice and feedback Notes, tips, sidebars, cautions, test-taking strategies, and time-saving tips that make studying as effective and time-efficient as possible The Cram Sheet tear-out card including tips, acronyms, and memory joggers not available anywhere else--perfect for last-minute study 
Topics covered in this book include physical, network, applications, systems, and operations security; access control; cryptography; securing architecture and modeling; business continuity and disaster recovery; security forensics; security management practices; and much more. Meer
Michael Gregg
Certified Ethical Hacker (CEH) Version 9 Pearson uCertify Course Student Access Card
0 beoordelingen
The Pearson uCertify courses combine Pearson’s certified and academic peer reviewed content in an accessible, flexible, & scalable platform! Courses can be offered in 3 formats: Instructor-Led, Self-paced or Hybrid. Meer
Craig Schiller Craig (CISO for Portland State University and President of Hawkeye Security Training, LLC) Schiller Seth Fogie Seth (Vice President, Airscanner, Dallas, TX, USA) Fogie Colby DeRodeff Colby (<b>GCIA, GCNA</b> Manager, Technical Marketing, ArcSight, Inc., CA) DeRodeff Michael Gregg Michael (President, Superior Solutions, Inc.) Gregg
InfoSecurity 2008 Threat Analysis
0 beoordelingen
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. Meer

Populaire producten

    Personen

      Trefwoorden