Title: ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, Author: Mike Chapple
Title: Managing Cybersecurity Risk: Cases Studies and Solutions, Author: Jonathan Reuvid
Title: Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture, Author: Gary Archer
Title: Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data, Author: Mark Talabis
Title: Information Security Applications: 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers, Author: Howon Kim
Title: Graphical Models for Security: Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers, Author: Barbara Kordy
Title: Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements, Author: David Lilburn Watson
Title: Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part II, Author: Xingming Sun
Title: Cold Cases: Evaluation Models with Follow-up Strategies for Investigators, Second Edition, Author: James M. Adcock
Title: Progress in Cryptology - LATINCRYPT 2021: 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6-8, 2021, Proceedings, Author: Patrick Longa
Title: Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century, Author: Ryan Trost
Title: Data Security and Privacy Protection: Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part I, Author: Xiaofeng Chen
Title: Open Source Intelligence (OSINT) - A practical Introduction: A Field Manual, Author: Varin Khera
Title: Artificial Immune System: Applications in Computer Security, Author: Ying Tan
Title: Provable Security: 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings, Author: Man-Ho Au
Title: Digital Forensics, Author: André Årnes
Title: Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers, Author: Vashek Matyás
Title: Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line, Author: Paul Troncone
Title: Information Security Practice and Experience: 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23-25, 2022, Proceedings, Author: Chunhua Su
Title: Network Intrusion Detection using Deep Learning: A Feature Learning Approach, Author: Kwangjo Kim

Pagination Links