Title: 21st Century Prometheus: Managing CBRN Safety and Security Affected by Cutting-Edge Technologies, Author: Maurizio Martellini
Title: 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them, Author: Michael Howard
Title: 70 Tips and Tricks for Mastering the CISSP Exam, Author: R. Sarma Danturthi
Title: A Course in Mathematical Cryptography, Author: Gilbert Baumslag
Title: A Cybersecurity Leader's Journey: Speaking the Language of the Board, Author: Edward Marchewka
Title: A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0), Author: Dan Shoemaker
Title: A History of Cyber Security Attacks: 1980 to Present, Author: Bruce Middleton
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: A Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET, Author: Iraj Sadegh Amiri
Title: AAA Identity Management Security, Author: Vivek Santuka
Title: Access Control Management in Cloud Environments, Author: Hua Wang
Title: Access Control, Security, and Trust: A Logical Approach, Author: Shiu-Kai Chin
Title: Active Directory Administration Cookbook: Actionable, proven solutions to identity management and authentication on servers and in the cloud, Author: Sander Berkouwer
Title: Adaptive Autonomous Secure Cyber Systems, Author: Sushil Jajodia
Title: Adopting Biometric Technology: Challenges and Solutions, Author: Ravindra Das
Title: Advanced Concepts in Defensive Tactics: A Survival Guide for Law Enforcement, Author: Chuck Joyner
Title: Advanced Cybersecurity Technologies, Author: Ralph Moseley
Title: Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits, Author: Eric Peeters
Title: Advanced Security Solutions for Multimedia, Author: Irshad Ahmad Ansari

Pagination Links