Title: Network Forensics: Tracking Hackers through Cyberspace, Author: Sherri Davidoff
Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks
Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh
Title: The CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms, Author: Raj Badhwar
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Threat Modeling, Author: Izar Tarandach
Title: Software Security Engineering: A Guide for Project Managers, Author: Nancy Mead
Title: Computer Security. ESORICS 2024 International Workshops: SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part II, Author: Joaquin Garcia-Alfaro
Title: Space-Air-Ground Integrated Network Security, Author: Jianwei Liu
Title: Checkpoint Next Generation Security Administration, Author: Syngress
Title: Network Perimeter Security: Building Defense In-Depth, Author: Cliff Riggs
Title: Network and Data Security for Non-Engineers, Author: Frank M. Groom
Title: Information Security: Design, Implementation, Measurement, and Compliance, Author: Timothy P. Layton
Title: Payment Technologies for E-Commerce, Author: Weidong Kou
Title: Art of Software Security Testing, The: Identifying Software Security Flaws, Author: Chris Wysopal
Title: Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response, Author: Joe Fichera
Title: Securing and Controlling Cisco Routers, Author: Peter T. Davis
Title: Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography, Author: Om Pal
Title: Business Continuity and Disaster Recovery Planning for IT Professionals, Author: Susan Snedaker
Title: Digital Twin Technology, Author: Gopal Chaudhary

Pagination Links