De Aller-Bedste Bøger - over 12 mio. danske og engelske bøger
Levering: 1 - 2 hverdage

Bøger af Eric Cole

Filter
Filter
Sorter efterSorter Populære
  • - Protecting Your Business from Real Threats in the Virtual World
    af Eric Cole
    298,95 kr.

    From cybersecurity expert and former CIA hacker Eric Cole, Cyber Crisis explains why cybersecurity should be the top concern for all professionals and offers actionable advice that anyone can implement on regular basis for increased safety and protection.

  • - How to Protect Yourself and Your Loved Ones From the Evil Side of the Internet
    af Eric Cole
    183,95 kr.

    Unsafe at Download Speeds teaches those who are not 100% confident in their cyber security what they need to know to be safe online.

  • af Eric Cole
    498,95 kr.

    As networks around the world have become more and more connected, an understanding of network security has become an integral part of a network administrator's job. People who design, implement, and manage networks on a day-to-day basis must understand the threats that exist and how to mitigate them to protect a company's assets.

  • af Eric Cole
    935,95 kr.

    As networks around the world have become more and more connected, an understanding of network security has become an integral part of a network administrator's job. People who design, implement, and manage networks on a day-to-day basis must understand the threats that exist and how to mitigate them to protect a company's assets.

  • af Eric Cole
    469,95 kr.

    The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side.

  • af Eric Cole
    481,95 kr.

    Teaches IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. This book begins by identifying the types of insiders who are most likely to pose a threat.