Title: Strategic Cyber Deterrence: The Active Cyber Defense Option, Author: Scott Jasper
Title: Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles, Author: Mark Buckwell
Title: Network Security Through Data Analysis: From Data to Action, Author: Michael Collins
Title: Network Programmability and Automation: Skills for the Next-Generation Network Engineer, Author: Matt Oswalt
Title: The Official (ISC)2 CCSP CBK Reference, Author: Aaron Kraus
Title: Firewall Policies and VPN Configurations, Author: Syngress
Title: Ethereal Packet Sniffing, Author: Syngress
Title: WarDriving and Wireless Penetration Testing, Author: Chris Hurley
Title: Botnets: The Killer Web Applications, Author: Craig Schiller
Title: Stealing the Network: How to Own a Shadow, Author: Johnny Long
Title: Cyber Strategy: Risk-Driven Security and Resiliency, Author: Carol A. Siegel
Title: Managing Security Services in Heterogenous Networks: Confidentiality, Integrity, Availability, Authentication, and Access Control, Author: R. Thandeeswaran
Title: Web Services Security, Author: Mark O'Neill
Explore Series
Title: Ransomware und Cyber-Erpressung: Das Praxishandbuch für IT- und Systemverantwortliche, Author: Sherri Davidoff
Title: Security Operations Center: Building, Operating, and Maintaining your SOC, Author: Joseph Muniz
Title: Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century, Author: Ryan Trost
Title: Ajax Security, Author: Billy Hoffman
Title: Security in RFID and Sensor Networks, Author: Paris Kitsos
Title: Network Security with NetFlow and IPFIX: Big Data Analytics for Information Security, Author: Omar Santos
Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks

Pagination Links