Toggle navigation
Of Denmark since 2005
Søg
ISK
AUD
(Australian Dollars)
A$
BRL
(Brazilian real)
R$
CAD
(Canadian Dollars)
CA$
CHF
(Swiss francs)
Fr.
CNY
(Chinese yuan)
元
CZK
(Czech koruny)
Kč
DKK
(Danske kroner)
EUR
(Euro)
€
GBP
(Pounds Sterling)
£
HKD
(Hong Kong dollars)
HK$
HUF
(Hungarian forints)
Ft
ILS
(Israeli shekel)
₪
ISK
(Icelandic kronur)
Íkr
JPY
(Japanese yen)
¥
KRW
(South Korean won)
₩
MXN
(Mexican peso)
Mex$
NOK
(Norwegian kroner)
NOK
NZD
(New Zealand dollars)
PLN
(Polish złotys)
zł
SEK
(Svenske kroner)
SEK
SGD
(Singapore dollars)
S$
TRY
(Turkish lira)
₺
USD
(Dollars)
$
ZAR
(South African rand)
R
Dansk
Deutsch
Deutsch (Switzerland)
English
English (Australia)
English (United Kingdom)
Español
Français
Nederlands
Norsk
Polski
Português
Português do Brasil
Suomi
Svenska
Vlaamse (Belgium)
Search
Search
Search
Advanced Search Options
Customer Service
Customer Service
Customer Service
General FAQ
Vinyl FAQ
Contact
Gift Card
Log in
Search
Udgivelser fra Syngress Media,U.S.
Home
Campaigns
Vinyl
CD's
K-pop
Movies
Books
Merchandise
Home
Home
Campaigns
Vinyl
CD's
K-pop
Movies
Books
Merchandise
Search
Publishers
Syngress Media,U.S.
Paperback Book
The Basics of Cyber Warfare: Und...
(2012)
Andress, Jason (CISSP, ISSAP, CI...
Íkr 3,269
Buy
Paperback Book
The Basics of Cloud Computing: U...
(2013)
Rountree, Derrick ((CISSP, CASP,...
Íkr 5,989
Buy
Paperback Book
Federated Identity Primer
(2012)
Rountree, Derrick ((CISSP, CASP,...
Íkr 4,589
Buy
Paperback Book
Cybercrime Case Presentation: An...
(2012)
Shavers, Brett (Digital Forensic...
Íkr 3,889
Buy
Paperback Book
Cybercrime Investigation Case St...
(2012)
Shavers, Brett (Digital Forensic...
Íkr 3,889
Buy
Paperback Book
Cybercrime Investigative Case Ma...
(2012)
Shavers, Brett (Digital Forensic...
Íkr 3,889
Buy
Paperback Book
Linux Malware Incident Response:...
(2013)
Casey, Eoghan (Eoghan Casey, cmd...
Íkr 3,889
Buy
Paperback Book
Assessing Vendors: A Hands-On Gu...
(2013)
More, Josh (Senior Security Cons...
Íkr 5,289
Buy
Paperback Book
Practical Anonymity: Hiding in P...
(2013)
Loshin, Pete (Internet-Standard....
Íkr 5,299
Buy
Paperback Book
1st edition
The Wireshark Field Guide: Analy...
(2013)
Shimonski, Robert (Director, IT ...
Íkr 5,999
Buy
Paperback Book
2nd edition
Business Continuity and Disaster...
(2013)
Snedaker, Susan (MCSE, MCT Found...
Íkr 10,909
Buy
Paperback Book
Simple Steps to Data Encryption:...
(2013)
Loshin, Peter (Internet-Standard...
Íkr 5,289
Buy
Paperback Book
X-Ways Forensics Practitioner's ...
(2013)
Shavers, Brett (Digital Forensic...
Íkr 9,509
Buy
Paperback Book
2nd edition
The Basics of Hacking and Penetr...
(2013)
Engebretson, Patrick (Dakota Sta...
Íkr 5,289
Buy
Paperback Book
The Basics of Web Hacking: Tools...
(2013)
Josh Pauli
Íkr 5,299
Buy
Paperback Book
Job Reconnaissance: Using Hackin...
(2013)
More, Josh (Senior Security Cons...
Íkr 5,289
Buy
Paperback Book
The Basics of Cyber Safety: Comp...
(2016)
Sammons, John (Associate Profess...
Íkr 5,999
Buy
Paperback Book
2nd edition
Cyber Warfare: Techniques, Tacti...
(2013)
Andress, Jason (CISSP, ISSAP, CI...
Íkr 6,699
Buy
Paperback Book
Cyber Security and IT Infrastruc...
(2013)
Vacca, John R. (Information Tech...
Íkr 8,119
Buy
Paperback Book
2nd edition
Managing Information Security
(2013)
John Vacca
Íkr 8,089
Buy
Paperback Book
2nd edition
Network and System Security
(2013)
John R Vacca
Íkr 9,479
Buy
Paperback Book
1st edition
Securing VoIP: Keeping Your VoIP...
(2014)
(Bud) Bates, Regis J. Jr (TC Int...
Íkr 8,119
Buy
Paperback Book
Collaboration with Cloud Computi...
(2014)
Messier, Ric (GSEC, CEH, CISSP, ...
Íkr 8,119
Buy
Paperback Book
4th edition
Windows Forensic Analysis Toolki...
(2014)
Carvey, Harlan (DFIR analyst, pr...
Íkr 10,909
Buy
Paperback Book
Applied Network Security Monitor...
(2014)
Sanders, Chris (Senior Informati...
Íkr 6,199
Buy
Paperback Book
Python Forensics: A Workbench fo...
(2014)
Hosmer, Chet (President, Python ...
Íkr 10,929
Buy
Paperback Book
Cloud Storage Forensics
(2013)
Quick, Darren (Darren Quick is a...
Íkr 10,929
Buy
Paperback Book
Social Engineering Penetration T...
(2014)
Watson, Gavin (Professional Serv...
Íkr 8,089
Buy
Paperback Book
Threat Forecasting: Leveraging B...
(2016)
Pirc, John (Director, Security S...
Íkr 6,169
Buy
Paperback Book
The Basics of Digital Privacy: S...
(2013)
Cherry, Denny ((MCSA, MCDBA, MCT...
Íkr 5,299
Buy
Paperback Book
1st edition
Detecting and Combating Maliciou...
(2014)
Ryan, Julie JCH (Associate Profe...
Íkr 5,299
Buy
Paperback Book
2nd edition
The Basics of Information Securi...
(2014)
Andress, Jason (CISSP, ISSAP, CI...
Íkr 5,999
Buy
Paperback Book
1st edition
Breaking into Information Securi...
(2015)
More, Josh (Senior Security Cons...
Íkr 6,699
Buy
Paperback Book
1st edition
Designing and Building Security ...
(2014)
Nathans, David (SC Magazine, con...
Íkr 8,089
Buy
Paperback Book
3rd edition
Securing SQL Server: Protecting ...
(2015)
Cherry, Denny ((MCSA, MCDBA, MCT...
Íkr 8,119
Buy
Paperback Book
4th edition
PCI Compliance: Understand and I...
(2014)
Williams, Branden R. (CISSP, CIS...
Íkr 10,929
Buy
Paperback Book
The Cloud Security Ecosystem: Te...
(2015)
Choo, Raymond (Fulbright Scholar...
Íkr 17,949
Buy
Paperback Book
Hacking Web Intelligence: Open S...
(2015)
Chauhan, Sudhanshu (Security Ana...
Íkr 9,479
Buy
Paperback Book
Building a Practical Information...
(2016)
Andress, Jason (CISSP, ISSAP, CI...
Íkr 10,909
Buy
Paperback Book
Smart Grid Security: Innovative ...
(2015)
Florian Skopik
Íkr 17,949
Buy
Paperback Book
1st edition
Building an Intelligence-Led Sec...
(2014)
Liska, Allan (Allan Liska, secur...
Íkr 10,929
Buy
Paperback Book
4th edition
Penetration Tester's Open Source...
(2016)
Faircloth, Jeremy ((Security+, C...
Íkr 9,509
Buy
Paperback Book
Optimizing IEEE 802.11i Resource...
(2014)
Iraj Sadegh Amiri
Íkr 10,909
Buy
Paperback Book
Security Controls Evaluation, Te...
(2016)
Johnson, Leighton (CTO and Senio...
Íkr 11,609
Buy
Paperback Book
Mobile Data Loss: Threats and Co...
(2015)
Raggo, Michael T. (CISSP, NSA-IA...
Íkr 5,289
Buy
Paperback Book
Automating Open Source Intellige...
(2015)
Layton, Robert (Research Fellow ...
Íkr 6,699
Buy
Paperback Book
A Machine-Learning Approach to P...
(2014)
Akanbi, O.A. (Graduate student i...
Íkr 10,929
Buy
Paperback Book
3rd edition
Google Hacking for Penetration T...
(2015)
Gardner, Bill (Bill Gardner OSCP...
Íkr 7,189
Buy
Paperback Book
2nd edition
Windows Registry Forensics: Adva...
(2016)
Carvey, Harlan (DFIR analyst, pr...
Íkr 8,329
Buy
Paperback Book
DNS Security: Defending the Doma...
(2016)
Liska, Allan (Consulting Systems...
Íkr 8,099
Buy
Paperback Book
Hiding Behind the Keyboard: Unco...
(2016)
Shavers, Brett (Digital Forensic...
Íkr 9,509
Buy
Paperback Book
Data Breach Preparation and Resp...
(2016)
Fowler, Kevvie (Partner and Nati...
Íkr 10,929
Buy
Paperback Book
Network Performance and Security...
(2016)
Chapman, Chris (Senior Methodolo...
Íkr 9,509
Buy
Hardcover Book
Handbook of System Safety and Se...
(2016)
Edward Griffor
Íkr 29,179
Buy
Paperback Book
Next Generation Red Teaming
(2015)
Dalziel, Henry (Founder, Concise...
Íkr 6,699
Buy
Paperback Book
Infosec Management Fundamentals
(2015)
Dalziel, Henry (Founder, Concise...
Íkr 6,699
Buy
Paperback Book
Securing Social Media in the Ent...
(2015)
Dalziel, Henry (Founder, Concise...
Íkr 6,699
Buy
Paperback Book
Dissecting the Hack: The V3rb0t3...
(2015)
Street, Jayson E. (Principle Par...
Íkr 6,699
Buy
Paperback Book
Protecting Patient Information: ...
(2016)
Cerrato, Paul (Contributing Edit...
Íkr 8,119
Buy
Paperback Book
Data Hiding Techniques in Window...
(2016)
Hassan, Nihad Ahmad (IT Security...
Íkr 8,089
Buy
Paperback Book
Implementing Digital Forensic Re...
(2016)
Sachowski, Jason (CISSP-ISSAP, C...
Íkr 9,509
Buy
Paperback Book
OS X Incident Response: Scriptin...
(2021)
Bradley, Jaron (Senior Intrusion...
Íkr 9,509
Buy
Paperback Book
Practical Deployment of Cisco Id...
(2015)
Richter, Andy (Principle Network...
Íkr 10,909
Buy
Paperback Book
Securing the Internet of Things
(2017)
Shancang Li
Íkr 9,509
Buy
Paperback Book
Digital Forensics: Threatscape a...
(2015)
John Sammons
Íkr 8,119
Buy
Paperback Book
PCI DSS 3.1: The Standard That K...
(2015)
Williams, Branden R. (CISSP, CIS...
Íkr 5,299
Buy
Paperback Book
Mobile Security and Privacy: Adv...
(2016)
Man-Ho Au
Íkr 15,139
Buy
Paperback Book
Deploying Secure Containers for ...
(2015)
Dalziel, Henry (Founder, Concise...
Íkr 4,509
Buy
Paperback Book
Automated Security Analysis of A...
(2015)
Dalziel, Henry (Founder, Concise...
Íkr 6,699
Buy
Paperback Book
Cyber Security Awareness for Law...
(2015)
David Willson
Íkr 6,699
Buy
Paperback Book
Meeting People via WiFi and Blue...
(2015)
Dalziel, Henry (Founder, Concise...
Íkr 6,699
Buy
Paperback Book
Cyber Security Awareness for Acc...
(2015)
David Willson
Íkr 6,699
Buy
Paperback Book
Cyber Security Awareness for CEO...
(2015)
David Willson
Íkr 6,699
Buy
Paperback Book
Essential Skills for Hackers
(2015)
Kevin Cardwell
Íkr 6,699
Buy
Paperback Book
Cyber Security Awareness for Cor...
(2015)
David Willson
Íkr 6,699
Buy
Paperback Book
Cyber Guerilla
(2016)
Van Haaster, Jelle (Netherlands ...
Íkr 8,119
Buy
Paperback Book
Contemporary Digital Forensic In...
(2016)
Kim Kwang Raymond Choo
Íkr 15,139
Buy
Paperback Book
Hacking Wireless Access Points: ...
(2016)
Kurtz, Jennifer (Information Ass...
Íkr 8,119
Buy
Paperback Book
Research Methods for Cyber Security
(2017)
Edgar, Thomas W. (Senior Cyber S...
Íkr 13,739
Buy
Paperback Book
A Study of Black Hole Attack Sol...
(2015)
Iraj Sadegh Amiri
Íkr 10,909
Buy
Paperback Book
Theoretical and Experimental Met...
(2015)
Iraj Sadegh Amiri
Íkr 10,909
Buy
Paperback Book
2nd edition
Coding for Penetration Testers: ...
(2016)
Andress, Jason (CISSP, ISSAP, CI...
Íkr 8,099
Buy
Paperback Book
Executing Windows Command Line I...
(2016)
Hosmer, Chet (President, Python ...
Íkr 10,929
Buy
Paperback Book
Advanced Persistent Security: A ...
(2016)
Winkler, Ira ((CISSP), President...
Íkr 8,119
Buy
Paperback Book
Preserving Electronic Evidence f...
(2016)
Rojas, Ernesto F. (CISSP, DFCP, ...
Íkr 10,909
Buy
Paperback Book
Information Security Science: Me...
(2016)
Young, Carl (Managing Director a...
Íkr 10,929
Buy
Paperback Book
2nd edition
Federal Cloud Computing: The Def...
(2017)
Metheny, Matthew (Chief Informat...
Íkr 10,929
Buy
Paperback Book
Integrating Python with Leading ...
(2016)
Hosmer, Chet (President, Python ...
Íkr 9,509
Buy
Paperback Book
3rd edition
Eleventh Hour CISSP®: Study Guide
(2016)
Feldman, Joshua (Senior Vice Pre...
Íkr 3,949
Buy
Paperback Book
Cisco PIX Firewalls: Configure /...
(2005)
Umer Khan
Íkr 8,779
Buy
Paperback Book
Sockets, Shellcode, Porting, and...
(2005)
Foster, James C (Deputy Director...
Íkr 8,819
Buy
Paperback Book
Securing IM and P2P Applications...
(2005)
Marcus Sachs
Íkr 8,799
Buy
Paperback Book
1st edition
Host Integrity Monitoring Using ...
(2005)
Brian Wotring
Íkr 8,099
Buy
Paperback Book
How to Cheat at Managing Windows...
(2006)
Barber, B. (Senior Technology Co...
Íkr 7,399
Buy
Paperback Book
Skype Me! From Single User to Sm...
(2005)
Markus Daehne
Íkr 6,549
Buy
Paperback Book
How to Cheat at IT Project Manag...
(2005)
Snedaker, Susan (MCSE, MCT Found...
Íkr 8,099
Buy
Paperback Book
1st edition
Perfect Password: Selection, Pro...
(2005)
Burnett, Mark (Independent resea...
Íkr 5,019
Buy
Paperback Book
Security Log Management: Identif...
(2006)
Babbin, Jacob (Contractor with a...
Íkr 8,819
Buy
Paperback Book
1st edition
RFID Security
(2006)
Thornton, Frank (Owner, Blacktho...
Íkr 8,799
Buy
Paperback Book
Insider Threat: Protecting the E...
(2006)
Eric Cole
Íkr 6,569
Buy
1–100
101–200