Title: Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture, Author: Gary Archer
Title: Building a Cyber Risk Management Program: Evolving Security for the Digital Age, Author: Brian Allen
Title: IT-Security und Botnetze. Aktuelle Angriffs- und Abwehrmethoden: Botnetze, Author: Dominik Wagner
Title: Botnets: The Killer Web Applications, Author: Craig Schiller
Title: How to Cheat at Securing Linux, Author: James Stanger
Title: How to Cheat at IIS 7 Server Administration, Author: Chris Adams
Title: Stealing the Network: How to Own a Shadow, Author: Johnny Long
Title: Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring, Author: Harlan Carvey
Title: CD and DVD Forensics, Author: Paul Crowley
Title: Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices, Author: Andrew Hay
Title: Practical Oracle Security: Your Unauthorized Guide to Relational Database Security, Author: Josh Shaul
Title: How to Cheat at Securing Linux, Author: James Stanger
Title: Security without Obscurity: Frequently Asked Questions (FAQ), Author: Jeff Stapleton
Title: Security Awareness: Grundlagen, Maßnahmen und Programme für die Informationssicherheit / Edition 1, Author: Stefan Beißel
Title: An Introduction to Crime and Crime Causation, Author: Robert C. Winters
Title: What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century, Author: Shimon Brathwaite
Title: Crime Prevention: Theory and Practice, Second Edition, Author: Stephen Schneider
Title: Network Protocols for Security Professionals: Probe and identify network-based vulnerabilities and safeguard against network protocol breaches, Author: Yoram Orzach
Title: Crime Prevention: Theory and Practice, Second Edition, Author: Stephen Schneider
Title: Secure Computers and Networks: Analysis, Design, and Implementation / Edition 1, Author: Eric A. Fisch

Pagination Links