This auction has closed with no winners.
View other items offered by Jakesjs99303

Similar products

86% OFF
ChatGPT & Simply Artificial Intelligence (AI) [eBook Bundle]
R129 R899
Building Great Landing Pages That Convert - Everything You Need For Effective Landing Pages Ebook
R10
How to Crack CD Protections
R1
60% OFF
30 Amazing E-Mail Marketing Tactics - Ebook
R19.99 R49.99

Cybersecurity Ebook Bundle SPECIAL!

2 were available / new
Indicative market price: R7,000
R1.00 auction closed
Closed 30 Nov 18 14:00
Shipping
Standard courier shipping from R60
R60 Standard shipping applies to orders under R100, in most areas in South Africa. R30 Standard shipping applies to orders over R100. Some areas may attract a R30 surcharge. This will be calculated at checkout if applicable.
Check my rate
Ready to ship in
The seller has indicated that they will usually have this item ready to ship within 3 business days. Shipping time depends on your delivery address. The most accurate delivery time will be calculated at checkout, but in general, the following shipping times apply:
 
Standard Delivery
Main centres:  1-3 business days
Regional areas: 3-4 business days
Remote areas: 3-5 business days

Product details

Discreet item
Condition
New
Location
South Africa
Customer ratings:
Bob Shop ID
386696717

·        Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary Edition

·        CEH v9: Certified Ethical Hacker Version 9 Study Guide

·        Cryptography Engineering: Design Principles and Practical Applications

·        Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

·        Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

·        Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition

·        Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition

·        Social Engineering: The Art of Human Hacking

·        The Art of Deception: Controlling the Human Element of Security

·        The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

·        The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition

·        The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2nd Edition

·        Threat Modelling: Designing for Security

·        Unauthorised Access: Physical Penetration Testing for IT Security Teams

Will be sold as a bundle, if you’re interested in specific books, please contact me for prices. 

The link for the Ebooks will be emailed within 48 hours of receiving payment.

Customer ratings: 1 ratings

Great Seller - excellent service
14 Jan 2019