Title: Network Forensics: Tracking Hackers through Cyberspace, Author: Sherri Davidoff
Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks
Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh
Title: The CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms, Author: Raj Badhwar
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Threat Modeling, Author: Izar Tarandach
Title: Data Protection for the HR Manager, Author: Mandy Webster
Title: CEH Certified Ethical Hacker Cert Guide, Author: Michael Gregg
Title: CompTIA Security+ SY0-701 Cert Guide, Author: Lewis Heuermann
Title: Security in RFID and Sensor Networks, Author: Paris Kitsos
Title: Secrecy, Covertness and Authentication in Wireless Communications: Physical Layer Security Approach, Author: Yulong Shen
Title: Internet and the Law: Technology, Society, and Compromises, 2nd Edition: Technology, Society, and Compromises, Author: Aaron Schwabach
Title: Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition, Author: Daniel Regalado
Title: The Cybersecurity Guide to Governance, Risk, and Compliance, Author: Jason Edwards
Title: CYBERSECURITY AND LEGAL-REGULATORY ASPECTS, Author: Gabi Siboni
Title: Online Health and Safety: From Cyberbullying to Internet Addiction: From Cyberbullying to Internet Addiction, Author: Bernadette H. Schell
Title: Digital Twin Technology, Author: Gopal Chaudhary
Title: IT Audit, Control, and Security, Author: Robert R. Moeller
Title: Recent Trends in Blockchain for Information Systems Security and Privacy, Author: Amit Kumar Tyagi
Title: Netcat Power Tools, Author: Jan Kanclirz

Pagination Links