Title: How to Cheat at Securing Linux, Author: James Stanger
Title: Security without Obscurity: Frequently Asked Questions (FAQ), Author: Jeff Stapleton
Title: Crime Prevention: Theory and Practice, Second Edition, Author: Stephen Schneider
Title: Network Protocols for Security Professionals: Probe and identify network-based vulnerabilities and safeguard against network protocol breaches, Author: Yoram Orzach
Title: What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century, Author: Shimon Brathwaite
Title: Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic, Author: Ravi Das
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: The Shellcoder's Handbook: Discovering and Exploiting Security Holes, Author: Chris Anley
Title: Malware, Rootkits, & Botnets, A Beginner's Guide / Edition 1, Author: Christopher C. Elisan
Title: Hacking Connected Cars: Tactics, Techniques, and Procedures, Author: Alissa Knight
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Alice and Bob Learn Application Security, Author: Tanya Janca
Title: Practical Cryptography / Edition 1, Author: Niels Ferguson
Title: Snort Intrusion Detection and Prevention Toolkit, Author: Brian Caswell
Title: A Guide to Kernel Exploitation: Attacking the Core, Author: Enrico Perla B.Sc.
Title: BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic, Author: Tom St Denis
Title: Unauthorised Access: Physical Penetration Testing For IT Security Teams / Edition 1, Author: Wil Allsopp
Title: Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls, Author: Christopher J Hodson
Title: Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat, Author: Paul Piccard
Title: Cyber Adversary Characterization: Auditing the Hacker Mind, Author: Tom Parker

Pagination Links