Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Inte...Lees meer
How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step ...Lees meer
The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing co...Lees meer
Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security w...Lees meer
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security...Lees meer
The worldwide video game console market surpassed $10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and thei...Lees meer
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure...Lees meer
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copy...Lees meer
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel...Lees meer
Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The...Lees meer
Practical Lock Picking, Second Edition , is an instructional manual that covers everything from straightforward lockpicking to quick-entry techniques ...Lees meer
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information techno...Lees meer
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commo...Lees meer
The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and admi...Lees meer
Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the chal...Lees meer
TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. Some of the largest networks today are buil...Lees meer
Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns wit...Lees meer
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems S...Lees meer
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest se...Lees meer
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Funct...Lees meer
This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explai...Lees meer
One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respo...Lees meer
Introducing Microsoft's flagship wireless development tool The .NET Mobile Web Developer's Guide will provide readers with a solid guide to developing...Lees meer
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniqu...Lees meer