Title: Network Forensics: Tracking Hackers through Cyberspace, Author: Sherri Davidoff
Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks
Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh
Title: The CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms, Author: Raj Badhwar
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Threat Modeling, Author: Izar Tarandach
Title: Network Security: Private Communication in a Public World, Author: Charlie Kaufman
Title: Certified Information Security Manager Exam Prep Guide: Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence, Author: Hemang Doshi
Title: Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach, Author: Jennifer L. Bayuk
Title: Enterprise Level Security: Securing Information Systems in an Uncertain World, Author: William R. Simpson
Title: Information Security Risk Analysis, Author: Thomas R. Peltier
Title: Cyber Defense: Best Practices for Digital Safety, Author: Jason Edwards
Title: Android Malware Detection and Adversarial Methods, Author: Weina Niu
Title: Understanding Cybersecurity Technologies: A Guide to Selecting the Right Cybersecurity Tools, Author: Abbas Moallem
Title: Introduction to Network Security, Author: Douglas Jacobson
Title: Operational Perspective of Modeling System Reliability: Research Tools for System Dynamics, Author: Deepti Aggrawal
Title: Wireless Security Handbook, Author: Aaron E. Earle
Title: Security and Risk Analysis for Intelligent Cloud Computing: Methods, Applications, and Preventions, Author: Ajay Kumar
Title: Hacking Exposed Mobile: Security Secrets & Solutions, Author: Neil Bergman
Title: Security Chaos Engineering: Sustaining Resilience in Software and Systems, Author: Kelly Shortridge

Pagination Links