Lead2Amazon
.com
Category:
All
Books
Magazine Subscriptions
Kindle Store
Digital Educational Resources
CDs & Vinyl
Classical
Digital Music
Movies & TV
Prime Video
Electronics
Camera & Photo
Cell Phones & Accessories
Appliances
Computers
Software
Video Games
Apps & Games
Toys & Games
Office Products
Home & Kitchen
Tools & Home Improvement
Sports & Outdoors
Garden & Outdoor
Luggage & Travel Gear
Musical Instruments
Automotive Parts & Accessories
Industrial & Scientific
Handmade
Arts, Crafts & Sewing
Collectibles & Fine Art
Clothing, Shoes & Jewelry
Clothing, Shoes & Jewelry Baby
Clothing, Shoes & Jewelry Boys
Clothing, Shoes & Jewelry Girls
Clothing, Shoes & Jewelry Men
Clothing, Shoes & Jewelry Women
Clothing & Accessories
Shoes
Watches
Jewelry
Beauty & Personal Care
Luxury Beauty
Baby
Grocery & Gourmet Food
Health, Household & Baby Care
Pet Supplies
Gift Cards
Home & Business Services
Everything Else
Language:
English
German
Spanish
Portuguese
Chinese (China)
Chinese (Taiwan)
Korean
Currency:
USD (United States Dollar)
AED (United Arab Emirates Dirham)
AMD (Armenian Dram)
ARS (Argentine Peso)
AUD (Australian Dollar)
AWG (Aruban Florin)
AZN (Azerbaijani Manat)
BGN (Bulgarian Lev)
BND (Bruneian Dollar)
BOB (Bolivian Boliviano)
BRL (Brazilian Real)
BSD (Bahamian Dollar)
BZD (Belize Dollar)
CAD (Canadian Dollar)
CLP (Chilean Peso)
CNY (Chinese Yuan Renminbi)
COP (Colombian Peso)
CRC (Costa Rican Colon)
DOP (Dominican Peso)
EGP (Egyptian Pound)
EUR (Euro)
GBP (British Pound)
GHS (Ghanaian Cedi)
GTQ (Guatemalan Quetzal)
HKD (Hong Kong Dollar)
HNL (Honduran Lempira)
HUF (Hungarian Forint)
IDR (Indonesian Rupiah)
ILS (Israeli Shekel)
INR (Indian Rupee)
JMD (Jamaican Dollar)
JPY (Japanese Yen)
KES (Kenyan Shilling)
KHR (Cambodian Riel)
KRW (South Korean Won)
KYD (Caymanian Dollar)
KZT (Kazakhstani Tenge)
LBP (Lebanese Pound)
MAD (Moroccan Dirham)
MNT (Mongolian Tughrik)
MOP (Macanese Pataca)
MUR (Mauritian Rupee)
MXN (Mexican Peso)
MYR (Malaysian Ringgit)
NAD (Namibian Dollar)
NGN (Nigerian Naira)
NOK (Norwegian Krone)
NZD (New Zealand Dollar)
PAB (Panamanian Balboa)
PEN (Peruvian Sol)
PHP (Philippine Peso)
PYG (Paraguayan Guaraní)
QAR (Qatari Riyal)
RUB (Russian Ruble)
SAR (Saudi Arabian Riyal)
SGD (Singapore Dollar)
THB (Thai Baht)
TRY (Turkish Lira)
TTD (Trinidadian Dollar)
TWD (Taiwan New Dollar)
TZS (Tanzanian Shilling)
UYU (Uruguayan Peso)
VND (Vietnamese Dong)
XCD (Eastern Caribbean Dollar)
ZAR (South African Rand)
Search Setting [Setting URL (List without Keyword): https://lead.to/amazon/com/?key=*&op=bt&bn=9715573011 ]
Keyword:
* ( List without Keyword)
Category: All
BrowseNode: 9715573011
Language: English
Currency: USD (United States Dollar)
Output: BibTeX Output
Display of "Out of Stock" : OFF
Sorting: Relevance
Extraction: Not Specified
Displayed Page : 1 (1st to 10th)
Threat Modeling: Designing for Security
Paperback Wiley Shostack, Adam [author]
[Networking & Cloud Computing (Rank:258)] [Computer Security & Encryption (Rank:230)] [Security Engineering ] [IT & Technical Security ] [Security Engineering ]
Release Date: 2014-02-17 Language: English Number of Pages: 624 ASIN/ISBN-10: 1118809998
ISBN-13: 978-1118809990
Price: $49.99 [New: In Stock (Amazon.com : 4.68 Point Based on 385 Customers)]
[ : Fulfilled by Amazon][ : Free Shipping][ : Amazon Prime]
@book{Shostack_Adam2014-02-17, title={Threat Modeling: Designing for Security}, author={Shostack, Adam}, publisher={Wiley}, year={2014}, month={2}, day={17}, date={2014-02-17}, edition={Paperback}, language={English}, pages={624}, keywords={Networking & Cloud Computing, Computer Security & Encryption, Security Engineering, IT & Technical Security}, isbn={978-1118809990}, isbn10={9781118809990}, url={https://lead.to/amazon/com/?op=bt&la=en&cu=&key=1118809998}, url-am={https://www.amazon.com/dp/1118809998/}, url-go={https://books.google.com/books?isbn=9781118809990}, url-wo={https://www.worldcat.org/search?qt=l2a&q=isbn%3A9781118809990}, price={$49.99}, condition={New}, timestamp={2024-07-04}, }
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Paperback Wiley Dang, Bruce [author], Gazet, Alexandre [author], Bachaalany, Elias [author]
[Computer Network Security (Rank:52)] [Computer Hacking (Rank:52)] [Computer Security & Encryption ] [Security Engineering ] [IT & Technical Security ]
Release Date: 2014-02-17 Language: English Number of Pages: 384 ASIN/ISBN-10: 1118787315
ISBN-13: 978-1118787311
Price: $34.80 [New: In Stock (Amazon.com : 4.68 Point Based on 385 Customers)]
Product Information [ : Fulfilled by Amazon][ : Free Shipping][ : Amazon Prime]
Used Book in Good Condition
@book{Dang_Bruce2014-02-17, title={Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation}, author={Dang, Bruce and Gazet, Alexandre and Bachaalany, Elias}, publisher={Wiley}, year={2014}, month={2}, day={17}, date={2014-02-17}, edition={Paperback}, language={English}, pages={384}, keywords={Computer Network Security, Computer Hacking, Computer Security & Encryption, Security Engineering, IT & Technical Security}, isbn={978-1118787311}, isbn10={9781118787311}, url={https://lead.to/amazon/com/?op=bt&la=en&cu=&key=1118787315}, url-am={https://www.amazon.com/dp/1118787315/}, url-go={https://books.google.com/books?isbn=9781118787311}, url-wo={https://www.worldcat.org/search?qt=l2a&q=isbn%3A9781118787311}, price={$34.80}, condition={New}, timestamp={2024-07-04}, }
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Paperback Wiley Hale Ligh, Michael [author], Case, Andrew [author], Levy, Jamie [author], Walters, AAron [author]
[Computer Network Security (Rank:446)] [Linux Networking & System Administration ] [Web Encryption (Rank:175)] [Computer Viruses (Rank:144)] [Computer Cryptography ]
Release Date: 2014-07-28 Language: English Number of Pages: 912 ASIN/ISBN-10: 1118825098
ISBN-13: 978-8126552214
Price: $55.99 [New: In Stock (Amazon.com : 4.68 Point Based on 385 Customers)]
[ : Fulfilled by Amazon][ : Free Shipping][ : Amazon Prime]
@book{Hale_Ligh_Michael2014-07-28, title={The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory}, author={Hale Ligh, Michael and Case, Andrew and Levy, Jamie and Walters, AAron}, publisher={Wiley}, year={2014}, month={7}, day={28}, date={2014-07-28}, edition={Paperback}, language={English}, pages={912}, keywords={Computer Network Security, Linux Networking & System Administration, Web Encryption, Computer Viruses, Computer Cryptography}, isbn={978-8126552214}, isbn10={8126552212}, url={https://lead.to/amazon/com/?op=bt&la=en&cu=&key=1118825098}, url-am={https://www.amazon.com/dp/1118825098/}, url-go={https://books.google.com/books?isbn=9788126552214}, url-wo={https://www.worldcat.org/search?qt=l2a&q=isbn%3A9788126552214}, price={$55.99}, condition={New}, timestamp={2024-07-04}, }
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Paperback Wiley Bullock, Jessey [author], Parker, Jeff T. [author]
[Computer Network Security (Rank:1047)] [Computer Hacking (Rank:952)] [Web Encryption (Rank:442)] [Computer Cryptography ] [Offensive & Defensive Security ]
Release Date: 2017-03-20 Language: English Number of Pages: 288 ASIN/ISBN-10: 1118918215
ISBN-13: 978-1118918210
Price: $20.99 [New: In Stock (Amazon.com : 4.68 Point Based on 385 Customers)]
[ : Fulfilled by Amazon][ : Free Shipping][ : Amazon Prime]
@book{Bullock_Jessey2017-03-20, title={Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework}, author={Bullock, Jessey and Parker, Jeff T.}, publisher={Wiley}, year={2017}, month={3}, day={20}, date={2017-03-20}, edition={Paperback}, language={English}, pages={288}, keywords={Computer Network Security, Computer Hacking, Web Encryption, Computer Cryptography, Offensive & Defensive Security}, isbn={978-1118918210}, isbn10={1118918215}, url={https://lead.to/amazon/com/?op=bt&la=en&cu=&key=1118918215}, url-am={https://www.amazon.com/dp/1118918215/}, url-go={https://books.google.com/books?isbn=9781118918210}, url-wo={https://www.worldcat.org/search?qt=l2a&q=isbn%3A9781118918210}, price={$20.99}, condition={New}, timestamp={2024-07-04}, }
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Paperback Wiley Ligh, Michael [author], Adair, Steven [author], Hartstein, Blake [author], Richard, Matthew [author]
[Networking & Cloud Computing (Rank:4199)] [Computer Security & Encryption (Rank:2670)] [Offensive & Defensive Security ] [IT & Technical Security ] [Offensive & Defensive Security ]
Release Date: 2010-11-02 Language: English Number of Pages: 752 ASIN/ISBN-10: 0470613033
ISBN-13: 978-0470613030
Price: $40.06 [New: In Stock (Apex_media🍏 : 4.79 Point Based on 1457 Customers)]
[ : Fulfilled by Amazon][ : Free Shipping][ : Amazon Prime]
@book{Ligh_Michael2010-11-02, title={Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code}, author={Ligh, Michael and Adair, Steven and Hartstein, Blake and Richard, Matthew}, publisher={Wiley}, year={2010}, month={11}, day={2}, date={2010-11-02}, edition={Paperback}, language={English}, pages={752}, keywords={Networking & Cloud Computing, Computer Security & Encryption, Offensive & Defensive Security, IT & Technical Security}, isbn={978-0470613030}, isbn10={0470613033}, url={https://lead.to/amazon/com/?op=bt&la=en&cu=&key=0470613033}, url-am={https://www.amazon.com/dp/0470613033/}, url-go={https://books.google.com/books?isbn=9780470613030}, url-wo={https://www.worldcat.org/search?qt=l2a&q=isbn%3A9780470613030}, price={$40.06}, condition={New}, timestamp={2024-07-04}, }
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
Paperback Wiley Hadnagy, Christopher [author], Fincher, Michele [author]
[Networking & Cloud Computing ] [Computer Hacking (Rank:870)] [Computer Security & Encryption ] [Engineering (Rank:24671)] [Security Engineering ]
Release Date: 2015-04-06 Language: English Number of Pages: 224 ASIN/ISBN-10: 1118958470
ISBN-13: 978-1118958476
Price: $21.44 [New: In Stock (Yakutstore : 4.61 Point Based on 34 Customers)]
[ : Fulfilled by Amazon][ : Free Shipping][ : Amazon Prime]
@book{Hadnagy_Christopher2015-04-06, title={Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails}, author={Hadnagy, Christopher and Fincher, Michele}, publisher={Wiley}, year={2015}, month={4}, day={6}, date={2015-04-06}, edition={Paperback}, language={English}, pages={224}, keywords={Networking & Cloud Computing, Computer Hacking, Computer Security & Encryption, Engineering, Security Engineering}, isbn={978-1118958476}, isbn10={1118958470}, url={https://lead.to/amazon/com/?op=bt&la=en&cu=&key=1118958470}, url-am={https://www.amazon.com/dp/1118958470/}, url-go={https://books.google.com/books?isbn=9781118958476}, url-wo={https://www.worldcat.org/search?qt=l2a&q=isbn%3A9781118958476}, price={$21.44}, condition={New}, timestamp={2024-07-04}, }
The Network Security Test Lab: A Step-by-Step Guide
Paperback Wiley Gregg, Michael [author]
[Security Certifications (Rank:531)] [Computer Network Security (Rank:984)] [Offensive & Defensive Security ] [IT & Technical Security ] [Offensive & Defensive Security ]
Release Date: 2015-08-24 Language: English Number of Pages: 480 ASIN/ISBN-10: 1118987055
ISBN-13: 978-1118987056
Price: $50.00 [New: In Stock (Amazon.com : 4.68 Point Based on 385 Customers)]
[ : Fulfilled by Amazon][ : Free Shipping][ : Amazon Prime]
@book{Gregg_Michael2015-08-24, title={The Network Security Test Lab: A Step-by-Step Guide}, author={Gregg, Michael}, publisher={Wiley}, year={2015}, month={8}, day={24}, date={2015-08-24}, edition={Paperback}, language={English}, pages={480}, keywords={Security Certifications, Computer Network Security, Offensive & Defensive Security, IT & Technical Security}, isbn={978-1118987056}, isbn10={1118987055}, url={https://lead.to/amazon/com/?op=bt&la=en&cu=&key=1118987055}, url-am={https://www.amazon.com/dp/1118987055/}, url-go={https://books.google.com/books?isbn=9781118987056}, url-wo={https://www.worldcat.org/search?qt=l2a&q=isbn%3A9781118987056}, price={$50.00}, condition={New}, timestamp={2024-07-04}, }
Implementing SSL / TLS Using Cryptography and PKI
Paperback Wiley Davies, Joshua [author]
[Internet & Telecommunications (Rank:2001)] [Internet & Social Media ] [Web Encryption (Rank:401)] [Computer Cryptography (Rank:364)] [Privacy & Online Safety ]
Release Date: 2011-01-11 Language: English Number of Pages: 704 ASIN/ISBN-10: 0470920416
ISBN-13: 978-0470920411
Price: $40.13 [New: In Stock (Amazon.com : 4.68 Point Based on 385 Customers)]
[ : Fulfilled by Amazon][ : Free Shipping][ : Amazon Prime]
@book{Davies_Joshua2011-01-11, title={Implementing SSL / TLS Using Cryptography and PKI}, author={Davies, Joshua}, publisher={Wiley}, year={2011}, month={1}, day={11}, date={2011-01-11}, edition={Paperback}, language={English}, pages={704}, keywords={Internet & Telecommunications, Internet & Social Media, Web Encryption, Computer Cryptography, Privacy & Online Safety}, isbn={978-0470920411}, isbn10={0470920416}, url={https://lead.to/amazon/com/?op=bt&la=en&cu=&key=0470920416}, url-am={https://www.amazon.com/dp/0470920416/}, url-go={https://books.google.com/books?isbn=9780470920411}, url-wo={https://www.worldcat.org/search?qt=l2a&q=isbn%3A9780470920411}, price={$40.13}, condition={New}, timestamp={2024-07-04}, }
Network Attacks and Exploitation: A Framework
Paperback Wiley Monte, Matthew [author]
[Computer Network Security (Rank:976)] [Computer Hacking (Rank:891)] [Computer Security & Encryption ] [Security Engineering ] [Offensive & Defensive Security ]
Release Date: 2015-08-03 Language: English Number of Pages: 224 ASIN/ISBN-10: 1118987128
ISBN-13: 978-1118987124
Price: $37.57 [New: In Stock (Amazon.com : 4.68 Point Based on 385 Customers)]
[ : Fulfilled by Amazon][ : Free Shipping][ : Amazon Prime]
@book{Monte_Matthew2015-08-03, title={Network Attacks and Exploitation: A Framework}, author={Monte, Matthew}, publisher={Wiley}, year={2015}, month={8}, day={3}, date={2015-08-03}, edition={Paperback}, language={English}, pages={224}, keywords={Computer Network Security, Computer Hacking, Computer Security & Encryption, Security Engineering, Offensive & Defensive Security}, isbn={978-1118987124}, isbn10={1118987128}, url={https://lead.to/amazon/com/?op=bt&la=en&cu=&key=1118987128}, url-am={https://www.amazon.com/dp/1118987128/}, url-go={https://books.google.com/books?isbn=9781118987124}, url-wo={https://www.worldcat.org/search?qt=l2a&q=isbn%3A9781118987124}, price={$37.57}, condition={New}, timestamp={2024-07-04}, }
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)
Hardcover John Wiley & Sons Inc Ulsch, N. MacDonnell [author]
[Information Management (Rank:2557)] [Offensive & Defensive Security ] [IT & Technical Security ] [Offensive & Defensive Security ] [Business & Finance (Rank:23838)]
Release Date: 2014-01-01 Language: English Number of Pages: 202 ASIN/ISBN-10: 1118836359
ISBN-13: 978-1118836354
Price: $6.24 [Used(Very Good): In stock Usually ships within 3 to 4 days. (ThriftBooks-Atlanta : 4.8 Point Based on 13313 Customers)]
@book{Ulsch_N_MacDonnell2014-01-01, title={Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)}, author={Ulsch, N. MacDonnell}, publisher={John Wiley & Sons Inc}, year={2014}, month={1}, day={1}, date={2014-01-01}, edition={Hardcover}, language={English}, pages={202}, keywords={Information Management, Offensive & Defensive Security, IT & Technical Security, Business & Finance}, isbn={978-1118836354}, isbn10={1118836359}, url={https://lead.to/amazon/com/?op=bt&la=en&cu=&key=1118836359}, url-am={https://www.amazon.com/dp/1118836359/}, url-go={https://books.google.com/books?isbn=9781118836354}, url-wo={https://www.worldcat.org/search?qt=l2a&q=isbn%3A9781118836354}, price={$6.24}, condition={Used(Very Good)}, timestamp={2024-07-04}, }
Simplified Setting and Result Count
Keyword:
* ( List without Keyword)
Category: All
BrowseNode: 9715573011
Display of "Out of Stock" : OFF
Extraction: Not Specified
Result Count: 20 hits
Sorting: Relevance
Displayed Page : 1 (1st to 10th)