Title: Cracking: Reverse Engineering with Ghidra, Author: Rob Botwright
Title: Cyberpunk: Outlaws and Hackers on the Computer Frontier, Author: Katie Hafner
Title: Hacking University Graduation Edition: 4 Manuscripts (Computer, Mobile, Python & Linux): Hacking Computers, Mobile Devices, Apps, Game Consoles and Learn Python & Linux, Author: Isaac D Cody
Title: Data Protection Officer, Author: Filip Johnssïn
Title: Cyber Wars: Hacks that Shocked the Business World, Author: Charles  Arthur
Title: Security Architect: Careers in information security, Author: Jon Collins
Title: How to Analyze the Cyber Threat from Drones: Background, Analysis Frameworks, and Analysis Tools, Author: Katharina  Ley Best
Title: DoDI 8510 Risk Management Framework (RMF) for DoD Information Technology (IT): DoDI 8510 w/Chg 2 July 28 2017, Author: Department of Defense
Title: Seven Deadliest Social Network Attacks, Author: Carl Timm
Title: Seven Deadliest Wireless Technologies Attacks, Author: Brad Haines
Title: Establish an Insider Threat Program under NISPOM: What the ITPSO, FSO and NISP Contractors Need to Know, Author: Jeffrey W Bennett
Title: Ultimate GDPR Practitioner Guide (2nd Edition): Demystifying Privacy & Data Protection, Author: Stephen R Massey
Title: Behavioral Cybersecurity: Fundamental Principles and Applications of Personality Psychology, Author: Wayne Patterson
Title: Hacking the Hacker: Learn From the Experts Who Take Down Hackers, Author: Roger A. Grimes
Title: Perfect Password: Selection, Protection, Authentication, Author: Mark Burnett
Title: PCI DSS Version 4.0.1: A Guide to the Payment Card Industry Data Security Standard, Author: Stephen Hancock
Title: PCI DSS Version 4.0: A guide to the payment card industry data security standard, Author: Stephen Hancock
Title: Project Zero Trust: A Story about a Strategy for Aligning Security and the Business, Author: George Finney
Title: Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication, Author: Robert W. Gehl
Title: Cyberspace and Security: A Fundamentally New Approach, Author: Victor Sheymov

Pagination Links