Erweiterte Suche
Preis einschränken:

Newsletter

Melden Sie sich jetzt an und erhalten Sie regelmäßig Informationen über neue Produkte, Sonderangebote oder neue Gutscheine.

Mit * gekennzeichnete Felder sind Pflichtfelder.

179,75 EUR*
Details Guide to Tactical Perimeter Defense: Becoming a Security Network Specialist

Guide to Tactical Perimeter Defense Guide to Tactical Perimeter Defense examines the critical defensive technologies needed to secure network perimeters. Written to map to the Security Certified Network Specialist certification (SCO-451), this book ...

59,00 EUR*
Details Economic Relevance of IT-Security: Austria in the International Comparison

Economic Relevance of It-Security IT-security sounds like a subject purely for a company's IT-department, for the IT-specialists alone. But IT-security definitely is more than just a technical "toy," its influence on a company's performance is real ...

9,03 EUR*
Details Specialist S1378EB Electro mortaiser laitonnée mit Tür

Used in conjunction with either latch, rose or knob handles;Brass plated;Tested to 300,000 cycle slam test;Suited only to internal doors as they provide no security features;Size: 75mm

90,18 EUR*
Details System Forensics, Investigation, and Response (Information Systems Security & Assurance)

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Computer crimes call for forensics specialists, people who know how to find and follow the evidence. System Forensics, Investigation, and Response begins by ...

30,99 EUR*
Details Btec National for It Practitioners: Core Units: Common Core and Specialist Units for All Pathways

Btec National for IT Practitioners: Core Units Covers Communication and Employability Skills; Communication Technologies; Computer Systems; Organizational Systems Security; Information Systems; Principles of Software Design and Development; IT Systems ...

36,40 EUR*
Details Stealing the Network: How to Own a Continent (Cyber-Fiction)

Stealing the Network A work of fiction which provides an insight into the boundaries of hacking and cyber-terrorism. It is written by a team of the cyber-security specialists in the world.

108,05 EUR*
Details Super Rod CRSK12 Installations-Set für Kabel, mit 12-m-Kabel, 13 Werkzeuge zum Kabelverlegen

Specialist Security Installation Kit;12 metres in length;13 attachments including 2 magnets;All Rods are manufactured from the unique material Adoxim 5;Compatible with the Cable Rod range from Super Rod

47,13 EUR*
Details Security Governance Checklists: Business Operations, Security Governance, Risk Management, and Enterprise Security Architecture (Large Print)

Security Governance Checklists The Chief Information Security Officer's (CISO) Toolkit is a collection of books and software for the Chief Information Security Officer (CISO) of a substantial enterprise. Security Checklists provides lists of items ...

106,99 EUR*
Details The Globalization of Security: State Power, Security Provision and Legitimacy (New Security Challenges)

The Globalization of Security The Globalization of Security is an important rethinking of the connections between globalization and security, focusing on a conceptual examination of the role of the state combined with key case studies. The book ...

44,81 EUR*
Details Physical and Logical Security Convergence. Powered by Enterprise Security Management (Syngress Media)

Physical and Logical Security Convergence Offers an explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in the changing security landscape ...

203,29 EUR*
Details Strategies for Achieving Food Security in Central Asia (NATO Science for Peace and Security Series C: Environmental Security)

Strategies for Achieving Food Security in Central Asia Food Security is a primary concern for all countries. This book summarises the presentations of a NATO Advanced Training Course addressing the issue of food security in Central Asia. The book is ...

57,41 EUR*
Details Email Security with Cisco Ironport (Networking Technology: Security)

Email Security with Cisco Ironport Email Security with Cisco IronPort thoroughly illuminates the security and performance challenges associated with today,s messaging environments and shows you how to systematically anticipate and respond to them ...

15,24 EUR*
Details Agfeo Security Line Montageplatten Security-Line Für Funkmodul Vpe 10X

Agfeo Security Line, Montageplatten, VPE: 10 Stück, für Funkmodule

30,97 EUR*
Details Beautiful Security: Leading Security Experts Explain How They Think

Beautiful Security An anthology that describes methods used to secure computer systems in the face of threats. It covers topics that include: rewiring the expectations and assumptions of organizations regarding security; security as a design ...