Title: ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, Author: Mike Chapple
Title: Cold Cases: Evaluation Models with Follow-up Strategies for Investigators, Second Edition, Author: James M. Adcock
Title: Computer Security: Art and Science, Author: Matt Bishop
Title: Software Security: Concepts & Practices, Author: Suhel Ahmad Khan
Title: Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, Author: Cynthia Brumfield
Title: Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®, Author: Susan Hansche
Title: Winning the National Security AI Competition: A Practical Guide for Government and Industry Leaders, Author: Chris Whitlock
Title: Information Security: 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, Proceedings, Author: Willy Susilo
Title: Secure Data Management: 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings, Author: Willem Jonker
Title: Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 -July 1, 2022, Proceedings, Author: Lorenzo Cavallaro
Title: Advances in Cryptology - EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part III, Author: Anne Canteaut
Title: Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring, Author: Harlan Carvey
Title: Malicious Attack Propagation and Source Identification, Author: Jiaojiao Jiang
Title: Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition, Author: Jan Killmeyer
Title: Risks and Security of Internet and Systems: 19th International Conference, CRiSIS 2024, Aix-en-Provence, France, November 26-28, 2024, Proceedings, Author: Simon Collart-Dutilleul
Title: Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings, Author: Jemal H. Abawajy
Title: Trusted Computing Platforms: TPM2.0 in Context, Author: Graeme Proudler
Title: Cyber Warfare, Security and Space Computing: Second International Conference on Cyber Warfare, Security and Space Computing, SpacSec 2024, Jaipur, India, February 22-23, 2024, Proceedings, Author: Sandeep Joshi
Title: Network and System Security: 13th International Conference, NSS 2019, Sapporo, Japan, December 15-18, 2019, Proceedings, Author: Joseph K. Liu
Title: Applied Cryptography and Network Security: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part II, Author: Kazue Sako

Pagination Links