Title: CEH Certified Ethical Hacker Cert Guide, Author: Michael Gregg
Title: CompTIA Security+ SY0-701 Cert Guide, Author: Lewis Heuermann
Title: Data Protection for the HR Manager, Author: Mandy Webster
Title: The Official (ISC)2 CISSP CBK Reference, Author: Arthur J. Deane
Title: Zero Trust Networks: Building Secure Systems in Untrusted Networks, Author: Razi Rais
Title: Zero Trust Architecture, Author: Cindy Green-Ortiz
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Network Programmability and Automation: Skills for the Next-Generation Network Engineer, Author: Matt Oswalt
Title: Secret History: The Story of Cryptology, Author: Craig Bauer
Title: Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions, Author: Aaron Philipp
Title: Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework, Author: Anne Kohnke
Title: 5G Cyber Risks and Mitigation, Author: Sabhyata Soni
Title: Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century, Author: Ryan Trost
Title: Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Author: Edward Skoudis
Title: Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles, Author: Mark Buckwell
Title: Security Metrics, Author: Andrew Jaquith
Title: Surviving Cyberwar, Author: Richard Stiennon
Title: Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network, Author: Stephen Watkins
Title: Computer Security. ESORICS 2024 International Workshops: SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part II, Author: Joaquin Garcia-Alfaro
Title: Building Secure Software: How to Avoid Security Problems the Right Way, Author: John Viega

Pagination Links