Title: PTFM, Author: Tim Bryant
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework, Author: Anne Kohnke
Title: Hack the Airwaves: Advanced BLE Exploitation Techniques, Author: Josh Luberisse
Title: (ISC)2 Certified Cloud Security Professional CCSP Realistic Practice Tests: 6 Realistic Practice Tests with 280+ Questions and detailed explanations to get you CCSP certified, Author: Certsquad Professional Trainers
Title: The SBA on PCP protocol: The SBA on PCP protocol, The Push - Check - Pull, Author: Ray Hermann Angossio Liwa
Title: Mastering Kali Purple: For Vulnerability Assessment and Penetration Testing, Author: EL MOSTAFA OUCHEN
Title: (ISC)2 Certified Information Systems Security Professional CISSP Realistic Practice Test: 5 Realistic Practice Tests with 500+ Questions and detailed explanations to get you CISSP certified, Author: Certsquad Professional Trainers
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Leave No Trace: A Red Teamer's Guide to Zero-Click Exploits, Author: Josh Luberisse
Title: Asset Protection through Security Awareness, Author: Tyler Justin Speed
Title: Cracking the Fortress: Bypassing Modern Authentication Mechanism, Author: Josh Luberisse
Title: How to Deploy One Password for Online Securities, Author: Abby Lotts
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Defending the Digital Perimeter Network Security Audit Readiness Strategies, Author: J. L. Parham
Title: Safeguarding the Digital Fortress: A Guide to Cyber Security, Author: Christopher Ford
Title: The Complete Guide to Cybersecurity Risks and Controls, Author: Anne Kohnke
Title: Army Techniques Publication ATP 6-02.71 Techniques for Department of Defense Information Network Operations April 2019, Author: United States Government Us Army
Title: DoD 5220.22-M National Industrial Security Program Operating Manual Incorporating Change 2 May 2016, Author: United States Government Us Army
Title: How to Cheat at Managing Information Security, Author: Mark Osborne

Pagination Links