Use+threats
1The Art of Memory Forensics. Detecting Malware and Threats in Windows, Linux, and Mac Memory , Andrew Case
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the… 5019.08 руб электронная книга2Inside the Crystal Ball. How to Make and Use Forecasts , Maury Harris
A practical guide to understanding economic forecasts In Inside the Crystal Ball: How to Make and Use Forecasts, UBS Chief U.S. Economist Maury Harris helps readers improve their own forecasting… 2273.13 руб электронная книга3The Upside: The 7 Strategies for Turning Big Threats into Growth Breakthroughs , Slywotzky Adrian J. (2008)
Today, when your fortunes can literally change overnight, the new strategic imperative is making your moment of maximum risk your moment of maximum opportunity. In The Upside, Adrian Slywotzky… 1584 руб4The Upside: The 7 Strategies for Turning Big Threats into Growth Breakthroughs , Adrian J. Slywotzky, Karl Weber (2007)
Today, when your fortunes can literally change overnight, the new strategic imperative is making your moment of maximum risk your moment of maximum opportunity. In The Upside, Adrian Slywotzky… 2049 грн (только Украина)5Selling Through Someone Else. How to Use Agile Sales Networks and Partners to Sell More , Robert Wollan
Experience the growth multiplier effect through transforming the distribution and sales network Selling Through Someone Else tackles new opportunities to drive company growth by taking a fresh look… 2601.58 руб электронная книга6Advanced Penetration Testing. Hacking the World's Most Secure Networks , Wil Allsopp
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to… 3251.98 руб электронная книга7Cyber-Risk Informatics. Engineering Evaluation with Data Science , Mehmet Sahinoglu
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling… 10038.89 руб электронная книга8Predicting Malicious Behavior. Tools and Techniques for Ensuring Global Security , Gary Jackson M.
A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world security scenarios with actual tools to predict and prevent… 3576.52 руб электронная книга9Microsoft Exchange Server 2007 For Dummies , John Mueller Paul
Microsoft Exchange Server 2007 was made to help you handle e-mail, meeting management, and other essential office services. Microsoft Exchange Server 2007 For Dummies helps you get a handle on… 2275.73 руб электронная книга10Hacking the Hacker. Learn From the Experts Who Take Down Hackers , Roger Grimes A.
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you… 1625.99 руб электронная книга