Seller: Goodwill Books, Hillsboro, OR, U.S.A.
Condition: Good. Signs of wear and consistent use.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New.
Seller: California Books, Miami, FL, U.S.A.
Condition: New.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition.
Seller: Russell Books, Victoria, BC, Canada
First Edition
US$ 59.95
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: New. First Edition. Special order direct from the distributor.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 63.35
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 70.02
Convert currencyQuantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Published by SAP PRESS (a division of Rheinwerk Publishing) -, 2023
ISBN 10: 1493224255 ISBN 13: 9781493224258
Language: English
Seller: Chiron Media, Wallingford, United Kingdom
US$ 72.00
Convert currencyQuantity: 2 available
Add to basketpaperback. Condition: New.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
US$ 84.71
Convert currencyQuantity: 2 available
Add to basketCondition: New. In.
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
US$ 70.44
Convert currencyQuantity: Over 20 available
Add to basketPaperback / softback. Condition: New. New copy - Usually dispatched within 2 working days. 1978.
Seller: Revaluation Books, Exeter, United Kingdom
US$ 89.19
Convert currencyQuantity: 1 available
Add to basketPaperback. Condition: Brand New. new edition. 1204 pages. 10.00x7.00x2.28 inches. In Stock.
Published by Rheinwerk Verlag Gmbh Dez 2023, 2023
ISBN 10: 1493224255 ISBN 13: 9781493224258
Language: English
Seller: AHA-BUCH GmbH, Einbeck, Germany
US$ 83.76
Convert currencyQuantity: 1 available
Add to basketTaschenbuch. Condition: Neu. Neuware - Uncover security vulnerabilities and harden your system against attacks! With this guide you'll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then expand your understanding of offline hacking, external safety checks, penetration testing in networks, and other essential security techniques, with step-by-step instructions. With information on mobile, cloud, and IoT security you can fortify your system against any threat!