Welcome to Boeklezers.nl

Boeklezers.nl is a network for social reading. We help readers discover new books and authors, and bring readers in contact with each other and with writers. Read more ».

Sign Up

Books

Network Threat Testing
Network Threat Testing
Network Threat Testing »
 
 
 
 
 

Investigating Wireless Networks and Devices [With Access Code]
Investigating Wireless Networks and Devices [With Access Code]
Investigating Wireless Networks and Devices »
 
 
 
 
 

Ec-Council Press Series
Ec-Council Press Series
Security Policy and Threats »
 
 
 
 
 

Investigating Hard Disks, File and Operating Systems [With Access Code]
Investigating Hard Disks, File and Operating Systems [With Access Code]
Investigating Hard Disks, File and Operating Systems »
 
 
 
 
 

Virtualization Security
Virtualization Security
Virtualization Security »
 
 
 
 
 

Computer Forensics: Investigating Network Intrusions and Cybercrime [With Access Code]
Computer Forensics: Investigating Network Intrusions and Cybercrime [With Access Code]
Investigating Network Intrusions and Cybercrime [With Access Code] »
 
 
 
 
 

Penetration Testing Network and Perimeter Testing
Penetration Testing Network and Perimeter Testing
Penetration Testing Network and Perimeter Testing »
 
 
 
 
 

Penetration Testing Procedures and Methodologies
Penetration Testing Procedures and Methodologies
Penetration Testing Procedures and Methodologies »
 
 
 
 
 

Cyber Safety
Cyber Safety
Cyber Safety »
 
 
 
 
 

Ethical Hacking and Countermeasures: Linux, Macintosh, and Mobile Systems [With Access Code]
Ethical Hacking and Countermeasures: Linux, Macintosh, and Mobile Systems [With Access Code]
Linux, Macintosh, and Mobile Systems [With Access Code] »
 
 
 
 
 

 
domReadyCallbacks.push( function() { new Error('Sorry, you can only do this when you're logged in. If you're not a member yet, please join us.'); });