Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Nous utilisons des cookies dans le but suivant :
Assurer le bon fonctionnement du site web, améliorer la sécurité et prévenir la fraude
Avoir un aperçu de l'utilisation du site web, afin d'améliorer son contenu et ses fonctionnalités
Pouvoir vous montrer les publicités les plus pertinentes sur des plateformes externes
Gestion des cookies
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Cookies techniques et fonctionnels
Ces cookies sont indispensables au bon fonctionnement du site internet et vous permettent par exemple de vous connecter. Vous ne pouvez pas désactiver ces cookies.
Cookies analytiques
Ces cookies collectent des informations anonymes sur l'utilisation de notre site web. De cette façon, nous pouvons mieux adapter le site web aux besoins des utilisateurs.
Cookies marketing
Ces cookies partagent votre comportement sur notre site web avec des parties externes, afin que vous puissiez voir des publicités plus pertinentes de Club sur des plateformes externes.
Une erreur est survenue, veuillez réessayer plus tard.
Il y a trop d’articles dans votre panier
Vous pouvez encoder maximum 250 articles dans votre panier en une fois. Supprimez certains articles de votre panier ou divisez votre commande en plusieurs commandes.
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, c...Savoir plus
Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America. As the cliché goes, information is ...Savoir plus
Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and progr...Savoir plus
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud ...Savoir plus
The Microsoft .NET initiative is the future of e-commerce - making it possible for organisations to build a secure, reliable e-commerce infrastructure...Savoir plus
Intrusion Prevention and Active Response provides an introduction to the field of Intrusion Prevention and provides detailed information on various IP...Savoir plus
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while s...Savoir plus
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can b...Savoir plus
An expert guide to Ruby, a popular new Object-Oriented Programming Language Ruby is quickly becoming a favourite among developers who need a simple, s...Savoir plus
Learn to pull "digital fingerprints" from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths ...Savoir plus
The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction...Savoir plus
Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for th...Savoir plus
Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare...Savoir plus
Investigative Case Management is a first look excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Investigative ...Savoir plus
This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT...Savoir plus
This is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professiona...Savoir plus
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terr...Savoir plus
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive co...Savoir plus
Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is prefe...Savoir plus
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure...Savoir plus
The first two books in this series "Stealing the Network: How to Own the Box" and "Stealing the Network: How to Own a Continent" have become classics ...Savoir plus
Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID...Savoir plus
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand th...Savoir plus
Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), a procedu...Savoir plus